WorldWideScience

Sample records for network advisory message

  1. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  2. Interarrival times of message propagation on directed networks

    Science.gov (United States)

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J.

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  3. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  4. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  5. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  6. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  7. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  8. Reaching adolescent girls through social networking: a new avenue for smoking prevention messages.

    Science.gov (United States)

    Struik, Laura Louise; Bottorff, Joan L; Jung, Mary; Budgen, Claire

    2012-09-01

    Because adolescent girls are being targeted on social networking sites by the tobacco industry, new online tobacco control (TC) initiatives are needed. The purpose of this interpretive descriptive study was to explore adolescent girls' perspectives on the use of social networking sites to deliver TC messages targeting young women. Focus groups were conducted with 17 girls aged 16 to 19. Seven TC messages were provided for evaluation and as context for discussion about the delivery of TC messages on social networking sites. Data were analyzed for themes, which included concerns about the effectiveness of current TC messages and the stereotypical representations of gender, factors perceived to influence the effectiveness of TC messages on social networking sites, and suggestions for enhancing the effectiveness of TC messages placed on social networking sites. Endorsement of TC messaging on social networking sites suggests that this medium is an untapped resource for smoking prevention.

  9. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  10. ITS Standards Advisory : Dynamic Message Signs (DMS)

    Science.gov (United States)

    2003-01-01

    ITS Standards Advisories provide the transportation community with information and guidance on key activities related to ITS standards, with each Advisory focusing on a single ITS application and its corresponding standards. This advisory focuses on ...

  11. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  12. Formation of a national network for rapid response to device and lead advisories: The Canadian Heart Rhythm Society Device Advisory Committee

    Science.gov (United States)

    Krahn, Andrew D; Simpson, Christopher S; Parkash, Ratika; Yee, Raymond; Champagne, Jean; Healey, Jeffrey S; Cameron, Doug; Thibault, Bernard; Mangat, Iqwal; Tung, Stanley; Sterns, Laurence; Birnie, David H; Exner, Derek V; Sivakumaran, Soori; Davies, Ted; Coutu, Benoit; Crystal, Eugene; Wolfe, Kevin; Verma, Atul; Stephenson, Elizabeth A; Sanatani, Shubhayan; Gow, Robert; Connors, Sean; Paredes, Felix Ayala; Turabian, Mike; Kus, Teresa; Essebag, Vidal; Gardner, Martin

    2009-01-01

    The Canadian Heart Rhythm Society (CHRS) Device Advisory Committee was commissioned to respond to advisories regarding cardiac rhythm device and lead performance on behalf of the CHRS. In the event of an advisory, the Chair uses an e-mail network to disseminate advisory information to Committee members broadly representative of the Canadian device community. A consensus recommendation is prepared by the Committee and made available to all Canadian centres on the CHRS Web site after approval by the CHRS executive. This collaborative approach using an e-mail network has proven very efficient in providing a rapid national response to device advisories. The network is an ideal tool to collect specific data on implanted device system performance and allows for prompt reporting of clinically relevant data to front-line clinicians and patients. PMID:19584969

  13. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  14. The model of microblog message diffusion based on complex social network

    Science.gov (United States)

    Zhang, Wei; Bai, Shu-Ying; Jin, Rui

    2014-05-01

    Microblog is a micromessage communication network in which users are the nodes and the followship between users are the edges. Sina Weibo is a typical case of these microblog service websites. As the enormous scale of nodes and complex links in the network, we choose a sample network crawled in Sina Weibo as the base of empirical analysis. The study starts with the analysis of its topological features, and brings in epidemiological SEIR model to explore the mode of message spreading throughout the microblog network. It is found that the network is obvious small-world and scale-free, which made it succeed in transferring messages and failed in resisting negative influence. In addition, the paper focuses on the rich nodes as they constitute a typical feature of Sina Weibo. It is also found that whether the message starts with a rich node will not account for its final coverage. Actually, the rich nodes always play the role of pivotal intermediaries who speed up the spreading and make the message known by much more people.

  15. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    Science.gov (United States)

    Carrilho, Sergio; Esaki, Hiroshi

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  16. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  17. 75 FR 79440 - Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of...

    Science.gov (United States)

    2010-12-20

    ... DEPARTMENT OF THE TREASURY Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of Application for Membership AGENCY: Financial Crimes Enforcement Network, Department of the... financial institutions and trade groups for membership on the Bank Secrecy Act Advisory Group. New members...

  18. Farmers’ Preferences for Mobile Agro Advisory Services

    Directory of Open Access Journals (Sweden)

    Duraisamy Prabha

    2017-12-01

    Full Text Available This study was conducted in Coimbatore district of Tamil Nadu to understand the service preferences of the mobile agro advisory services offered by the public extension system. The agro advisories offered by the e-extension centre of Tamil Nadu Agricultural University were selected for the study. A sample of 200 respondents was selected employing proportionate random sampling method. The study was carried out in terms of dimensions viz., technical components, message frequency and timings, message physical dimension, message channel and message follow up. Results of the survey showed that among the technical components majority of the respondents opined that the information on advance warning of weather risks was very much adequate, the messages on plant protection were relevant and that the messages on advance warning of weather risks were timely. With reference to the message frequency, a majority preferred frequency of the messages on daily basis and preferred to receive messages during mornings.

  19. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    Science.gov (United States)

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  20. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    Science.gov (United States)

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  1. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  2. Secure message authentication system for node to node network

    Science.gov (United States)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  3. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Energy Technology Data Exchange (ETDEWEB)

    Sachpazidis, Ilias [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)]. E-mail: Ilias.Sachpazidis@igd.fraunhofer.de; Ohl, Roland [MedCom Gesellschaft fuer medizinische Bildverarbeitung mbH, Runderturmstr. 12, D-64283, Darmstadt (Germany); Kontaxakis, George [Universidad Politecnica de Madrid, ETSI Telecomunicacion, Madrid 28040 (Spain); Sakas, Georgios [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)

    2006-12-20

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  4. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    International Nuclear Information System (INIS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-01-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber

  5. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Science.gov (United States)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  6. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness

    Science.gov (United States)

    Mangus, J Michael; Turner, Benjamin O

    2017-01-01

    Abstract While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between structures implicated in the encoding of sensory information, which disrupts message processing and thereby inhibits attitude change. However, persuasion is a multi-determined construct that results from both message features and audience characteristics. Therefore, persuasive messages should lead to specific functional connectivity patterns among a priori defined structures within the persuasion network. The present study exposed 28 subjects to anti-drug public service announcements where arousal, argument strength, and subject drug-use risk were systematically varied. Psychophysiological interaction analyses provide support for the affective-executive hypothesis but not for the encoding-disruption hypothesis. Secondary analyses show that video-level connectivity patterns among structures within the persuasion network predict audience responses in independent samples (one college-aged, one nationally representative). We propose that persuasion neuroscience research is best advanced by considering network-level effects while accounting for interactions between message features and target audience characteristics. PMID:29140500

  7. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness.

    Science.gov (United States)

    Huskey, Richard; Mangus, J Michael; Turner, Benjamin O; Weber, René

    2017-12-01

    While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between structures implicated in the encoding of sensory information, which disrupts message processing and thereby inhibits attitude change. However, persuasion is a multi-determined construct that results from both message features and audience characteristics. Therefore, persuasive messages should lead to specific functional connectivity patterns among a priori defined structures within the persuasion network. The present study exposed 28 subjects to anti-drug public service announcements where arousal, argument strength, and subject drug-use risk were systematically varied. Psychophysiological interaction analyses provide support for the affective-executive hypothesis but not for the encoding-disruption hypothesis. Secondary analyses show that video-level connectivity patterns among structures within the persuasion network predict audience responses in independent samples (one college-aged, one nationally representative). We propose that persuasion neuroscience research is best advanced by considering network-level effects while accounting for interactions between message features and target audience characteristics. © The Author (2017). Published by Oxford University Press.

  8. Balancing emergency message dissemination and network lifetime in wireless body area network using ant colony optimization and Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    R. Latha

    Full Text Available Nowadays, Wireless Body Area Network (WBAN is emerging very fast and so many new methods and algorithms are coming up for finding the optimal path for disseminating emergency messages. Ant Colony Optimization (ACO is one of the cultural algorithms for solving many hard problems such as Travelling Salesman Problem (TSP. ACO is a natural behaviour of ants, which work stochastically with the help of pheromone trails deposited in the shortest route to find their food. This optimization procedure involves adapting, positive feedback and inherent parallelism. Each ant will deposit certain amount of pheromone in the tour construction it makes searching for food. This type of communication is known as stigmetric communication. In addition, if a dense WBAN environment prevails, such as hospital, i.e. in the environment of overlapping WBAN, game formulation was introduced for analyzing the mixed strategy behaviour of WBAN. In this paper, the ant colony optimization approach to the travelling salesman problem was applied to the WBAN to determine the shortest route for sending emergency message to the doctor via sensor nodes; and also a static Bayesian game formulation with mixed strategy was analysed to enhance the network lifetime. Whenever the patient needs any critical care or any other medical issue arises, emergency messages will be created by the WBAN and sent to the doctor's destination. All the modes of communication were realized in a simulation environment using OMNet++. The authors investigated a balanced model of emergency message dissemination and network lifetime in WBAN using ACO and Bayesian game formulation. Keywords: Wireless body area network, Ant colony optimization, Bayesian game model, Sensor network, Message latency, Network lifetime

  9. ANALYSIS OF MARKOV NETWORK WITH INCOMES, POSITIVE AND NEGATIVE MESSAGES

    Directory of Open Access Journals (Sweden)

    V. V. Naumenko

    2014-01-01

    Full Text Available Markov queuing network with income in transient regime is considered. It has positive and negative messages, which can be used in forecasting income of information and telecommunication systems and networks affected by viruses. Investigations are carried out in the cases when incomes from transitions between network states are deterministic functions dependent on states, or they are random variables with given mean values. In the last case it is assumed that all network systems operate in a high load mode. An example is given.

  10. Predicting behavior change from persuasive messages using neural representational similarity and social network analyses.

    Science.gov (United States)

    Pegors, Teresa K; Tompson, Steven; O'Donnell, Matthew Brook; Falk, Emily B

    2017-08-15

    Neural activity in medial prefrontal cortex (MPFC), identified as engaging in self-related processing, predicts later health behavior change. However, it is unknown to what extent individual differences in neural representation of content and lived experience influence this brain-behavior relationship. We examined whether the strength of content-specific representations during persuasive messaging relates to later behavior change, and whether these relationships change as a function of individuals' social network composition. In our study, smokers viewed anti-smoking messages while undergoing fMRI and we measured changes in their smoking behavior one month later. Using representational similarity analyses, we found that the degree to which message content (i.e. health, social, or valence information) was represented in a self-related processing MPFC region was associated with later smoking behavior, with increased representations of negatively valenced (risk) information corresponding to greater message-consistent behavior change. Furthermore, the relationship between representations and behavior change depended on social network composition: smokers who had proportionally fewer smokers in their network showed increases in smoking behavior when social or health content was strongly represented in MPFC, whereas message-consistent behavior (i.e., less smoking) was more likely for those with proportionally more smokers in their social network who represented social or health consequences more strongly. These results highlight the dynamic relationship between representations in MPFC and key outcomes such as health behavior change; a complete understanding of the role of MPFC in motivation and action should take into account individual differences in neural representation of stimulus attributes and social context variables such as social network composition. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2016-01-01

    To enhance the performance of single intrusion detection systems (IDSs), collaborative intrusion detection networks (CIDNs) have been developed, which enable a set of IDS nodes to communicate with each other. In such a distributed network, insider attacks like collusion attacks are the main threat...... to advanced insider attacks in practical deployment. In this paper, we design a novel type of collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way. In the evaluation, we explore the attack performance under both simulated...... and real network environments. Experimental results indicate that under our attack, malicious nodes can send malicious responses to normal requests while maintaining their trust values....

  12. Deployment and Field Evaluation of In-Vehicle Traffic Signal Advisory System (ITSAS

    Directory of Open Access Journals (Sweden)

    Joyoung Lee

    2017-06-01

    Full Text Available This research evaluates the impact of In-vehicle Signal Advisory System (ITSAS on signalized arterial. ITSAS provides individual drivers equipped with a mobile communication device with advisory speed information enabling to minimize the time delay and fuel consumption when crossing intersection. Given the instantaneous vehicular driving information, such as position, speed, and acceleration rate, ITSAS produces advisory speed information by taking into consideration the traffic signal changes at a downstream intersection. The advisory speed information includes not only an optimal speed range updated every 300-ft for individual drivers but also a descriptive message to warn drivers stop to ensure safety at the downstream intersection. Unlike other similar Connected Vehicles applications for intersection management, ITSAS does not require Roadside Equipment (RSE to disseminate the advisory speed information as it is designed to exploit commercial cellular network service (i.e., 3G and 4G-LTE. Thus, ITSAS can be easily plugged into existing traffic control management system to rapidly conduct its implementation without significant additional cost. This research presents the field evaluations of ITSAS on a signalized corridor in New Jersey, which discovered significant travel time savings for the equipped vehicle.

  13. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  14. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  15. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application.

    Science.gov (United States)

    Velásquez-Villada, Carlos; Donoso, Yezid

    2016-03-25

    Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river's course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas' movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

  16. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  17. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application

    Directory of Open Access Journals (Sweden)

    Carlos Velásquez-Villada

    2016-03-01

    Full Text Available Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

  18. Influence of farmers educational level on comprehending, acting-upon and sharing of agro advisories

    Directory of Open Access Journals (Sweden)

    M. J. Chandre Gowda

    2015-10-01

    Full Text Available Although short messaging service (SMS through mobile phones has quickly gained popularity among most other sectors in India, its potential is not fully realised in the agriculture sector as a cost effective service to reach farmers and elicit desirable action. Despite the cost effectiveness, mobile messaging has remained a challenge in the farming sector in terms of its end use and action as far as extension systems are concerned. While there could be many influencing factors affecting the utility of mobile messages, this study assumed that educational level of farmers could be a major factor. A telephone survey was conducted to ascertain the influence of farmers’ education on the level of utilisation of mobile-based advisories. Farmers with higher education level showed better comprehension of advisories, acted-upon the advisories more promptly and shared the information with fellow farmers more often than those with lower education level. There was a significant association between comprehending, sharing and acting upon advisories. This has implications to achieve enhanced extension reach with higher efficiency in terms of cost and time.

  19. NCC simulation model. Phase 2: Simulating the operations of the Network Control Center and NCC message manual

    Science.gov (United States)

    Benjamin, Norman M.; Gill, Tepper; Charles, Mary

    1994-01-01

    The network control center (NCC) provides scheduling, monitoring, and control of services to the NASA space network. The space network provides tracking and data acquisition services to many low-earth orbiting spacecraft. This report describes the second phase in the development of simulation models for the FCC. Phase one concentrated on the computer systems and interconnecting network.Phase two focuses on the implementation of the network message dialogs and the resources controlled by the NCC. Performance measures were developed along with selected indicators of the NCC's operational effectiveness.The NCC performance indicators were defined in terms of the following: (1) transfer rate, (2) network delay, (3) channel establishment time, (4) line turn around time, (5) availability, (6) reliability, (7) accuracy, (8) maintainability, and (9) security. An NCC internal and external message manual is appended to this report.

  20. The Impact of Message Replication on the Performance of Opportunistic Networks for Sensed Data Collection

    Directory of Open Access Journals (Sweden)

    Tekenate E. Amah

    2017-11-01

    Full Text Available Opportunistic networks (OppNets provide a scalable solution for collecting delay‑tolerant data from sensors for their respective gateways. Portable handheld user devices contribute significantly to the scalability of OppNets since their number increases according to user population and they closely follow human movement patterns. Hence, OppNets for sensed data collection are characterised by high node population and degrees of spatial locality inherent to user movement. We study the impact of these characteristics on the performance of existing OppNet message replication techniques. Our findings reveal that the existing replication techniques are not specifically designed to cope with these characteristics. This raises concerns regarding excessive message transmission overhead and throughput degradations due to resource constraints and technological limitations associated with portable handheld user devices. Based on concepts derived from the study, we suggest design guidelines to augment existing message replication techniques. We also follow our design guidelines to propose a message replication technique, namely Locality Aware Replication (LARep. Simulation results show that LARep achieves better network performance under high node population and degrees of spatial locality as compared with existing techniques.

  1. End-to-End Delay Model for Train Messaging over Public Land Mobile Networks

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-11-01

    Full Text Available Modern train control systems rely on a dedicated radio network for train to ground communications. A number of possible alternatives have been analysed to adopt the European Rail Traffic Management System/European Train Control System (ERTMS/ETCS control system on local/regional lines to improve transport capacity. Among them, a communication system based on public networks (cellular&satellite provides an interesting, effective and alternative solution to proprietary and expensive radio networks. To analyse performance of this solution, it is necessary to model the end-to-end delay and message loss to fully characterize the message transfer process from train to ground and vice versa. Starting from the results of a railway test campaign over a 300 km railway line for a cumulative 12,000 traveled km in 21 days, in this paper, we derive a statistical model for the end-to-end delay required for delivering messages. In particular, we propose a two states model allowing for reproducing the main behavioral characteristics of the end-to-end delay as observed experimentally. Model formulation has been derived after deep analysis of the recorded experimental data. When it is applied to model a realistic scenario, it allows for explicitly accounting for radio coverage characteristics, the received power level, the handover points along the line and for the serving radio technology. As an example, the proposed model is used to generate the end-to-end delay profile in a realistic scenario.

  2. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  3. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  4. Use of Social Network Sites and Instant Messaging Does Not Lead to Increased Offline Social Network Size, or to Emotionally Closer Relationships with Offline Network Members

    NARCIS (Netherlands)

    Pollet, Thomas V.; Roberts, Sam G. B.; Dunbar, Robin I. M.

    The effect of Internet use on social relationships is still a matter of intense debate. This study examined the relationships between use of social media (instant messaging and social network sites), network size, and emotional closeness in a sample of 117 individuals aged 18 to 63 years old. Time

  5. Data dissemination of emergency messages in mobile multi-sink wireless sensor networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Havinga, Paul J.M.

    In wireless sensor networks (WSNs), data dissemination is generally performed from sensor nodes to a static sink. If the data under consideration is an emergency message such as a fire alarm, it must be transmitted as fast and reliably as possible towards the sink of WSN. In such mission critical

  6. 76 FR 25695 - Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance

    Science.gov (United States)

    2011-05-05

    .../library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf . Written comments... http://www.cdc.gov/phin/library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf...-2011-0004] Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance AGENCY...

  7. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  8. Minimizing Redundant Messages and Improving Search Efficiency under Highly Dynamic Mobile P2P Network

    Directory of Open Access Journals (Sweden)

    Ajay Arunachalam

    2016-02-01

    Full Text Available Resource Searching is one of the key functional tasks in large complex networks. With the P2P architecture, millions of peers connect together instantly building a communication pattern. Searching in mobile networks faces additional limitations and challenges. Flooding technique can cope up with the churn and searches aggressively by visiting almost all the nodes. But it exponentially increases the network traffic and thus does not scale well. Further the duplicated query messages consume extra battery power and network bandwidth. The blind flooding also suffers from long delay problem in P2P networks. In this paper, we propose optimal density based flooding resource discovery schemes. Our first model takes into account local graph topology information to supplement the resource discovery process while in our extended version we also consider the neighboring node topology information along with the local node information to further effectively use the mobile and network resources. Our proposed method reduces collision at the same time minimizes effect of redundant messages and failures. Overall the methods reduce network overhead, battery power consumption, query delay, routing load, MAC load and bandwidth usage while also achieving good success rate in comparison to the other techniques. We also perform a comprehensive analysis of the resource discovery schemes to verify the impact of varying node speed and different network conditions.

  9. An Eco-Driving Advisory System for Continuous Signalized Intersections by Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Wei-Hsun Lee

    2018-01-01

    Full Text Available With the vehicular ad hoc network (VANET technology which support vehicle-to-vehicle (V2V and vehicle to road side unit (V2R/R2V communications, vehicles can preview the intersection signal plan such as signal countdown message. In this paper, an ecodriving advisory system (EDAS is proposed to reduce CO2 emissions and energy consumption by letting the vehicle continuously pass through multiple intersections with the minimum possibilities of stops. We extend the isolated intersection model to multiple continuous intersections scenario. A hybrid method combining three strategies including maximized throughput model (MTM, smooth speed model (SSM, and minimized acceleration and deceleration (MinADM is designed, and it is compared with related works maximized throughput model (MaxTM, open traffic light control model (OTLCM, and predictive cruise control (PCC models. Some issues for the practical application including safe car following, queue clearing, and gliding mode are discussed and conquered. Simulation results show that the proposed model outperforms OTLCM 25.1%~81.2% in the isolated intersection scenario for the CO2 emissions and 20.5%~84.3% in averaged travel time. It also performs better than the compared PCC model in CO2 emissions (19.9%~31.2% as well as travel time (24.5%~35.9% in the multiple intersections scenario.

  10. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness

    OpenAIRE

    Huskey, Richard; Mangus, J Michael; Turner, Benjamin O; Weber, René

    2017-01-01

    Abstract While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between stru...

  11. Flow of emotional messages in artificial social networks

    OpenAIRE

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  12. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  13. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  14. Flow of Emotional Messages in Artificial Social Networks

    Science.gov (United States)

    Chmiel, Anna; Hołyst, Janusz A.

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account that the preferential selection of message receivers depends on the communication intensity during the recent period only. We also model the phenomenon of secondary social sharing when the reception of an emotional e-mail triggers the distribution of several emotional e-mails to other people.

  15. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter.

    Directory of Open Access Journals (Sweden)

    Kar-Hai Chu

    Full Text Available This study explores the presence and actions of an electronic cigarette (e-cigarette brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender's local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed.We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread.The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes.Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion.

  16. Extending IM beyond the Reference Desk: A Case Study on the Integration of Chat Reference and Library-Wide Instant Messaging Network

    Directory of Open Access Journals (Sweden)

    Ian Chan

    2012-09-01

    Full Text Available Openfire is an open source IM network and a single unified application that meets the needs of chat reference and internal communications. In Fall 2009, the California State University San Marcos (CSUSM Library began use of Openfire and other Jive software instant messaging technologies, to simultaneously improve our existing IM-integrated chat reference software and implement an internal IM network. This case study describes the chat reference and internal communications environment at the CSUSM Library and the selection, implementation, and evaluation of Openfire. In addition, the authors discuss the benefits of deploying an integrated instant messaging and chat reference network.

  17. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  18. Use of social network sites and instant messaging does not lead to increased offline social network size, or to emotionally closer relationships with offline network members.

    Science.gov (United States)

    Pollet, Thomas V; Roberts, Sam G B; Dunbar, Robin I M

    2011-04-01

    The effect of Internet use on social relationships is still a matter of intense debate. This study examined the relationships between use of social media (instant messaging and social network sites), network size, and emotional closeness in a sample of 117 individuals aged 18 to 63 years old. Time spent using social media was associated with a larger number of online social network "friends." However, time spent using social media was not associated with larger offline networks, or feeling emotionally closer to offline network members. Further, those that used social media, as compared to non-users of social media, did not have larger offline networks, and were not emotionally closer to offline network members. These results highlight the importance of considering potential time and cognitive constraints on offline social networks when examining the impact of social media use on social relationships.

  19. Synchronous message-based communication for distributed heterogeneous systems

    International Nuclear Information System (INIS)

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  20. 78 FR 70954 - Risk Communications Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2013-11-27

    ... awareness and understanding of the key risk messages, as well as whether the communications are having the... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2013-N-0001] Risk Communications Advisory Committee; Notice of Meeting AGENCY: Food and Drug Administration, HHS...

  1. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  2. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  3. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    CSIR Research Space (South Africa)

    Pennefather, S

    2017-09-01

    Full Text Available of applications written in the Go programming language to be executed on a Network Flow Processor (NFP) for enhanced performance. This paper explores the need and feasibility of implementing a message passing model for data transmission between the NFP and CPU...

  4. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive

  5. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  7. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  8. Moving forward on strengthening and sustaining National Immunization Technical Advisory Groups (NITAGs) globally: Recommendations from the 2nd global NITAG network meeting.

    Science.gov (United States)

    MacDonald, Noni E; Duclos, Philippe; Wichmann, Ole; Henaff, Louise; Harnden, Anthony; Alshammary, Aisha; Tijerino, Roberto Arroba; Hall, Madeline; Sacarlal, Jahit; Singh, Rupa Rajbhandari

    2017-12-15

    National Immunization Technical Advisory Groups (NITAGs) provide independent, evidence-informed advice to assist their governments in immunization policy formation. This is complex work and many NITAGs face challenges in fulfilling their roles. Inter-country NITAG collaboration opportunities have the potential to enhance NITAG function and grow the quality of recommendations. Hence the many requests for formation of a network linking NITAGs together so they can learn from each other. The first Global NITAG Network (GNN) meeting, held in 2016, led to a push to launch the GNN and grow the network. At the second GNN meeting, held June 28-29, 2017 in Berlin, the GNN was formally inaugurated. Participants discussed GNN governance, reflected on the April 2017 Strategic Advisory Group of Experts (SAGE) on Immunization conclusions concerning strengthening of NITAGs and also shared NITAG experiences in evaluation and inter-country collaborations and independence. They also discussed the role of Regional Technical Advisory Groups on Immunization (RTAGs) and regional networks. A number of issues were raised including NITAGs and communications, dissemination of recommendations and vaccine implementation as well as implications of off-label recommendations. Participants were alerted to immunization evidence assessment sites and value of sharing of resources. They also discussed potential GNN funding opportunities, developed an action plan for 2017-18 and selected a Steering Committee to help move the GNN forward. All participants agreed on the importance of the GNN and the value in attracting more countries to join the GNN. Copyright © 2017.

  9. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  10. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  11. Report on the IAEA advisory group meeting on network of nuclear reaction data centres

    Energy Technology Data Exchange (ETDEWEB)

    Pronyaev, V G; Schwerer, O [International Atomic Energy Agency, Nuclear Data Section, Vienna (Austria)

    2000-08-01

    This report summarizes the IAEA Advisory Group Meeting (AGM) on Network of Nuclear Reaction Data Centres, hold at the Institute of Physics and Power Engineering, Obninsk, Russia, 15 to 19 May 2000. The meeting was attended by 28 participants from 13 co-operating data centres from seven Member States and two International Organizations. The report contains a meeting summary, the conclusions and actions, progress and status reports of the participating data centres and working papers considered at the meeting. (author)

  12. Factors influencing message dissemination through social media

    Science.gov (United States)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  13. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  14. Development of a Social DTN for Message Communication between SNS Group Members

    Directory of Open Access Journals (Sweden)

    Hidenori Takasuka

    2018-04-01

    Full Text Available Smartphones have the ability to communicate with other terminals through ad hoc connections. A variety of applications have been developed to exploit this ability. The authors have developed an Android OS (operating system application (called “social DTN manager” that builds a DTN (delay, disruption, disconnection tolerant networking among members of a social networking service (SNS community using a community token. The members can exchange messages over this network. Control messages for building a DTN are forwarded to only those nodes that use the same community token in order to reduce flooding of message copies. When a source node sends a communication request to its destination node, they exchange control messages to establish a communication route. Relay nodes use these messages to create and hold routing information for these nodes in their routing tables. Thereafter, relay nodes can forward data messages based on their routing tables. This again reduces flooding of message copies. The social DTN manager incorporates these functions, Facebook Graph API and Google Nearby Connections API. The authors have installed it in Android terminals and confirmed that a social DTN can successfully be built using this application and that data messages can be exchanged between terminals via reactive routes.

  15. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  16. Stepwise Development a Text Messaging-Based Bullying Prevention Program for Middle School Students (BullyDown).

    Science.gov (United States)

    Ybarra, Michele L; Prescott, Tonya L; Espelage, Dorothy L

    2016-06-13

    Bullying is a significant public health issue among middle school-aged youth. Current prevention programs have only a moderate impact. Cell phone text messaging technology (mHealth) can potentially overcome existing challenges, particularly those that are structural (e.g., limited time that teachers can devote to non-educational topics). To date, the description of the development of empirically-based mHealth-delivered bullying prevention programs are lacking in the literature. To describe the development of BullyDown, a text messaging-based bullying prevention program for middle school students, guided by the Social-Emotional Learning model. We implemented five activities over a 12-month period: (1) national focus groups (n=37 youth) to gather acceptability of program components; (2) development of content; (3) a national Content Advisory Team (n=9 youth) to confirm content tone; and (4) an internal team test of software functionality followed by a beta test (n=22 youth) to confirm the enrollment protocol and the feasibility and acceptability of the program. Recruitment experiences suggested that Facebook advertising was less efficient than using a recruitment firm to recruit youth nationally, and recruiting within schools for the pilot test was feasible. Feedback from the Content Advisory Team suggests a preference for 2-4 brief text messages per day. Beta test findings suggest that BullyDown is both feasible and acceptable: 100% of youth completed the follow-up survey, 86% of whom liked the program. Text messaging appears to be a feasible and acceptable delivery method for bullying prevention programming delivered to middle school students.

  17. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  18. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Directory of Open Access Journals (Sweden)

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  19. Librarians’ messages to publishers: turning research into practice

    Directory of Open Access Journals (Sweden)

    Bernie Folan

    2017-11-01

    Full Text Available In early 2017 a piece of research was carried out via questionnaire asking librarians to share the messages they wanted to convey to publishers. There was the option of anonymous submission to encourage candour. This research aimed to supplement messages offered to publishers and other organizations via library advisory board meetings, conference talks and other channels. The hope is to facilitate understanding and to progress the library/publisher partnership that is essential for a healthy future for research communication. A lightning talk at the 2017 UKSG Annual Conference summarized the key findings. This article now shares the findings in more depth and delves into the detail of the most recurrent themes. It also features some organizational case studies which illustrate how the findings are being used practically and/or how these organizations ensure they understand the needs of the libraries they work with. These case studies may help other publishers with the implementation of listening programmes.

  20. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  1. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  2. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  3. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  4. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  5. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    OpenAIRE

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  6. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    Science.gov (United States)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  7. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  8. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  9. A Software Implementation of a Satellite Interface Message Processor.

    Science.gov (United States)

    Eastwood, Margaret A.; Eastwood, Lester F., Jr.

    A design for network control software for a computer network is described in which some nodes are linked by a communications satellite channel. It is assumed that the network has an ARPANET-like configuration; that is, that specialized processors at each node are responsible for message switching and network control. The purpose of the control…

  10. A Collaboration-Oriented M2M Messaging Mechanism for the Collaborative Automation between Machines in Future Industrial Networks

    Directory of Open Access Journals (Sweden)

    Zhaozong Meng

    2017-11-01

    Full Text Available Machine-to-machine (M2M communication is a key enabling technology for industrial internet of things (IIoT-empowered industrial networks, where machines communicate with one another for collaborative automation and intelligent optimisation. This new industrial computing paradigm features high-quality connectivity, ubiquitous messaging, and interoperable interactions between machines. However, manufacturing IIoT applications have specificities that distinguish them from many other internet of things (IoT scenarios in machine communications. By highlighting the key requirements and the major technical gaps of M2M in industrial applications, this article describes a collaboration-oriented M2M (CoM2M messaging mechanism focusing on flexible connectivity and discovery, ubiquitous messaging, and semantic interoperability that are well suited for the production line-scale interoperability of manufacturing applications. The designs toward machine collaboration and data interoperability at both the communication and semantic level are presented. Then, the application scenarios of the presented methods are illustrated with a proof-of-concept implementation in the PicknPack food packaging line. Eventually, the advantages and some potential issues are discussed based on the PicknPack practice.

  11. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  12. College Students' Text Messaging, Use of Textese and Literacy Skills

    Science.gov (United States)

    Drouin, M. A.

    2011-01-01

    In this study, I examined reported frequency of text messaging, use of textese and literacy skills (reading accuracy, spelling and reading fluency) in a sample of American college students. Participants reported using text messaging, social networking sites and textese more often than was reported in previous (2009) research, and their frequency…

  13. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  14. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  15. Expanding the Scope of Instant Messaging with Bidirectional Haptic Communication

    OpenAIRE

    Kim, Youngjae; Hahn, Minsoo

    2010-01-01

    This work was conducted on the combination of two fields, i.e., haptic and social messaging. Haptic is one of the most attention-drawing fields and the biggest buzzwords among nextgeneration users. Haptic is being applied to conventional devices such as the cellular phone and even the door lock. Diverse forms of media such as blogs, social network services, and instant messengers are used to send and receive messages. That is mainly why we focus on the messaging experience, the most frequent ...

  16. Automated endoscopic navigation and advisory system from medical image

    Science.gov (United States)

    Kwoh, Chee K.; Khan, Gul N.; Gillies, Duncan F.

    1999-05-01

    , which is developed to obtain the relative depth of the colon surface in the image by assuming a point light source very close to the camera. If we assume the colon has a shape similar to a tube, then a reasonable approximation of the position of the center of the colon (lumen) will be a function of the direction in which the majority of the normal vectors of shape are pointing. The second layer is the control layer and at this level, a decision model must be built for endoscope navigation and advisory system. The system that we built is the models of probabilistic networks that create a basic, artificial intelligence system for navigation in the colon. We have constructed the probabilistic networks from correlated objective data using the maximum weighted spanning tree algorithm. In the construction of a probabilistic network, it is always assumed that the variables starting from the same parent are conditionally independent. However, this may not hold and will give rise to incorrect inferences. In these cases, we proposed the creation of a hidden node to modify the network topology, which in effect models the dependency of correlated variables, to solve the problem. The conditional probability matrices linking the hidden node to its neighbors are determined using a gradient descent method which minimizing the objective cost function. The error gradients can be treated as updating messages and ca be propagated in any direction throughout any singly connected network to adjust the network parameters. With the above two- level approach, we have been able to build an automated endoscope navigation and advisory system successfully.

  17. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  18. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  19. Shaping guanxi networks at work through instant messaging

    NARCIS (Netherlands)

    Ou, Carol; Davison, R.M.

    Instant messaging (IM) has become increasingly prevalent in social life. However, the use of IM at work remains controversial, owing to its unclear benefits to organizations. In this study, we employ media performance theories and the concept model of communicative ecology to examine the impact of

  20. Soft real-time alarm messages for ATLAS TDAQ

    Science.gov (United States)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-05-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  1. Soft real-time alarm messages for ATLAS TDAQ

    International Nuclear Information System (INIS)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-01-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  2. Soft real-time alarm messages for ATLAS TDAQ

    Energy Technology Data Exchange (ETDEWEB)

    Darlea, G., E-mail: georgiana.lavinia.darlea@cern.c [CERN, Geneva (Switzerland); Al Shabibi, A.; Martin, B.; Lehmann Miotto, G. [CERN, Geneva (Switzerland)

    2010-05-21

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  3. Telemetry Standards, RCC Standard 106-17. Chapter 24. Message Formats

    Science.gov (United States)

    2017-07-01

    Structure A TSS data message is a wrapper used to aid specialized routing of network traffic between TmNS networks over other networks . The structure of...IP)- network systems and, therefore, are not required to comply with the big -endian convention. The IP specification defines standard network byte...numeric values in TmNSMessageHeader and PackageHeader fields of the TmNSMessage as following network byte order (i.e., big -endian). 24.2.1

  4. Kompresi Teks Menggunakan Algoritma Huffman Dan Md5 Pada Instant Messaging Smartphone Android

    OpenAIRE

    Chulkamdi, M. Taofik; Pramono, Sholeh Hadi; Yudaningtyas, Erni

    2015-01-01

    Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application as an alternative communication via short message service (SMS). Remembering how important this application, so writer make an instant message application with small text transmission that will provide in the current needs with Huffman algorith...

  5. A message passing algorithm for the evaluation of social influence

    NARCIS (Netherlands)

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  6. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  7. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  8. 78 FR 69991 - Advisory Committee; Veterinary Medicine Advisory Committee; Termination

    Science.gov (United States)

    2013-11-22

    .... FDA-2013-N-1380] Advisory Committee; Veterinary Medicine Advisory Committee; Termination AGENCY: Food... announcing the termination of the Veterinary Medicine Advisory Committee. This document removes the Veterinary Advisory Committee from the Agency's list of standing advisory committees. DATES: This rule is...

  9. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    Science.gov (United States)

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  10. Affective and executive network processing associated with persuasive antidrug messages.

    Science.gov (United States)

    Ramsay, Ian S; Yzer, Marco C; Luciana, Monica; Vohs, Kathleen D; MacDonald, Angus W

    2013-07-01

    Previous research has highlighted brain regions associated with socioemotional processes in persuasive message encoding, whereas cognitive models of persuasion suggest that executive brain areas may also be important. The current study aimed to identify lateral prefrontal brain areas associated with persuasive message viewing and understand how activity in these executive regions might interact with activity in the amygdala and medial pFC. Seventy adolescents were scanned using fMRI while they watched 10 strongly convincing antidrug public service announcements (PSAs), 10 weakly convincing antidrug PSAs, and 10 advertisements (ads) unrelated to drugs. Antidrug PSAs compared with nondrug ads more strongly elicited arousal-related activity in the amygdala and medial pFC. Within antidrug PSAs, those that were prerated as strongly persuasive versus weakly persuasive showed significant differences in arousal-related activity in executive processing areas of the lateral pFC. In support of the notion that persuasiveness involves both affective and executive processes, functional connectivity analyses showed greater coactivation between the lateral pFC and amygdala during PSAs known to be strongly (vs. weakly) convincing. These findings demonstrate that persuasive messages elicit activation in brain regions responsible for both emotional arousal and executive control and represent a crucial step toward a better understanding of the neural processes responsible for persuasion and subsequent behavior change.

  11. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  12. An effect of loudness of advisory speech on a choice response task

    Science.gov (United States)

    Utsuki, Narisuke; Takeuchi, Yoshinori; Nomiyama, Takenori

    1995-03-01

    Recent technologies have realized talking advisory/guidance systems in which machines give advice and guidance to operators in speech. However, nonverbal aspects of spoken messages may have significant effects on an operator's behavior. Twelve subjects participated in a TV game-like choice response task where they were asked to choose a 'true' target from three invader-like figures displayed on a CRT screen. The subjects had received a prerecorded advice designating either left, center, or right target that would be true before each choice. The position of the 'true' targets and advice were preprogrammed in pseudorandom sequences. In other words, there was no way for the subjects to predict the 'true' target and there was no relationship between spoken advice and the true target position. The subjects tended to make more choices corresponding to the presented messages when the messages were presented in a louder voice than in a softer voice. Choice response time was significantly shorter when the response was the same as the advice indicated. The shortening of response time was slightly greater when advice was presented in a louder voice. This study demonstrates that spoken advice may result in faster and less deliberate reponses in accordance with the presented messages which are given by talking guidance systems.

  13. What makes it likeable? A study on the reactions to messages in a digital social network: the case of Facebook in Farsi.

    Science.gov (United States)

    Sabbar, Shaho; Hyun, Daiwon

    2016-01-01

    After a piece of information is put into a network, its fate depends on the behaviors of the nodes of the network; nodes that are equipped with the hardware and software of the age of information and are more powerful than any time in the past. This study suggests that a useful research for communication, marketing and advertising would be one that looks for patterns in the reactions of the nodes toward different pieces of information. This study has used Facebook to see how people have reacted to different types of messages in terms of liking, sharing and commenting. Rather than looking for universal, generalizable patterns we have tried to examine the practicality of the proposed method. The practical aspect of the study comes after a short theoretical discussion on the issue of flow of information in a digital world. The results revealed dozens of significant relations between the examined variables. This study, its theoretical discussion and results suggest that it would be practical to study the relations between the characteristics of Facebook messages and the type of reactions (liking, sharing and commenting) that they attract.

  14. Key technologies of the server monitor and control system based on GSM short messages

    International Nuclear Information System (INIS)

    Chen Taiwei; Zhou Zhenliu; Liu Baoxu

    2007-01-01

    The network management based on SNMP protocol cannot effectively monitor and control application-system states and key-process states on the computer server. Furthermore, it needs the administrator's longtime surveillance. When the administrator leaves the computer, he can't receive the malfunction message in time. In this paper we present a server monitor and control system based on monitor agents and GSM short messages, introduce the key technology to realize it, and implement a model system in the real network environment. (authors)

  15. Protocol for multiple node network

    Science.gov (United States)

    Kirkham, Harold (Inventor)

    1995-01-01

    The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.

  16. Perancangan dan Implementasi Sistem Informasi Layanan Short Messaging Service (SMS)

    OpenAIRE

    Rossy W, Cahyo; Wellem, Theophilus; Utomo, Wiranto Herry

    2006-01-01

    Development progress of Communication technology increase in a line with the people demand of the technology, such as Wireless communication technology, especially, Global System for Mobile Communication (GSM), which known as a digital mobile phone. Mobile phone used to send and receive short message in GSM network known as Short Messaging Service (SMS), besides communicate with another person by voice. In recent years, SMS is not just used for text-based communication tool between mobile pho...

  17. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    OpenAIRE

    James Kadirire

    2007-01-01

    'Instant Messaging' (IM) and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002). This research looks at the us...

  18. Emergency Message Dissemination System for Smartphones During Natural Disasters

    NARCIS (Netherlands)

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  19. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  20. A Massively Scalable Architecture for Instant Messaging & Presence

    NARCIS (Netherlands)

    Schippers, Jorrit; Remke, Anne Katharina Ingrid; Punt, Henk; Wegdam, M.; Haverkort, Boudewijn R.H.M.; Thomas, N.; Bradley, J.; Knottenbelt, W.; Dingle, N.; Harder, U.

    2010-01-01

    This paper analyzes the scalability of Instant Messaging & Presence (IM&P) architectures. We take a queueing-based modelling and analysis approach to ��?nd the bottlenecks of the current IM&P architecture at the Dutch social network Hyves, as well as of alternative architectures. We use the

  1. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  2. Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks

    DEFF Research Database (Denmark)

    Hillmann, Robert; Trier, Matthias

    2012-01-01

    . The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and the ties among them. These motifs are associated with common social network effects to derive meaningful insights about dissemination activities. The data basis includes several thousand social networks...... with textual messages classified according to embedded positive and negative sentiments. Based on this data, sub-networks are extracted and analyzed with a dynamic network motif analysis to determine dissemination patterns and associated network effects. Results indicate that the emergence of digital social...... networks exhibits a strong tendency towards reciprocity, followed by the dominance of hierarchy as an intermediate step leading to social clustering with hubs and transitivity effects for both positive and negative sentiments to the same extend. Sentiments embedded in exchanged textual messages do only...

  3. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  4. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  5. Consumer attitudes and risks associated with packaged foods having advisory labeling regarding the presence of peanuts.

    Science.gov (United States)

    Hefle, Susan L; Furlong, Terence J; Niemann, Lynn; Lemon-Mule, Heather; Sicherer, Scott; Taylor, Steve L

    2007-07-01

    Foods with advisory labeling (eg, "may contain") are increasingly prevalent. Consumers with food allergies might ignore advisory labeling advice. We sought to determine whether consumers with food allergy heeded advisory labels and whether products with advisory labels contained detectable peanut allergen. Surveys (n = 625 in 2003 and n = 645 in 2006) were conducted at Food Allergy & Anaphylaxis Network patient conferences. Food products bearing advisory statements regarding peanuts were analyzed for the presence of peanut. Consumers were less likely to heed advisory labeling in 2006 (75%) compared with in 2003 (85%, P 1 mg of peanut or >0.25 mg of peanut protein) were detected in only 13 of 200 such products. Consumers with food allergy are increasingly ignoring advisory labeling. Because food products with advisory labeling do contain detectable levels of peanuts, a risk exists to consumers choosing to eat such foods. The format of the labeling statement did not influence the likelihood of finding detectable peanut, except for products listing peanuts as a minor ingredient, but did influence the choices of consumers with food allergy. Allergic patients are taking risks by increasingly disregarding advisory labeling.

  6. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications

    Directory of Open Access Journals (Sweden)

    Jorge Herrera-Tapia

    2016-09-01

    Full Text Available Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE simulator and using real human mobility traces.

  7. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications.

    Science.gov (United States)

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-09-18

    Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.

  8. The persuasion context and results in online opinion seeking: effects of message and source-the moderating role of network managers.

    Science.gov (United States)

    Cabezudo, Rebeca San José; Izquierdo, Carmen Camarero; Pinto, Javier Rodríguez

    2013-11-01

    Online opinion networks are areas for social exchange, or conversational networks, made up of individuals actively involved in sharing experiences and opinions concerning matters of mutual interest between consumers or concerning their experience with a given product or service. We pinpoint a gap in the literature regarding how the persuasion process occurs when individuals seek opinions online, including the results process. In an attempt to find an answer, we draw on traditional theories related to information processing. These are mostly taken from the field of psychology and enable us to identify which signals or aspects of communication or opinions the individuals focus their attention on (message and source) and the value attached to such communications as well as how much they impact individuals' purchase decisions, bearing in mind the medium (or online opinion network) in which the opinions are located. Findings from those interviewed support the idea that the quality of information on the Internet, as well as trust in the source of said information, or in the opinion of network users, have an impact on the informational value obtained from involvement in this online opinion seeking and on purchasing decisions. Moreover, depending on the kind of network (firm or brand controlled, review Web sites, and user-controlled nonofficial opinion networks), the quality of the information or trust in the users will have a different bearing in the persuasion process.

  9. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory... matters include system requirements, operating policies, community organization, knowledge management... would like to request advice and recommendations on the user experience regarding the identity proofing...

  10. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  11. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  12. MESA: Message-Based System Analysis Using Runtime Verification

    Science.gov (United States)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  13. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    Directory of Open Access Journals (Sweden)

    James Kadirire

    2007-06-01

    Full Text Available 'Instant Messaging' (IM and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002. This research looks at the use of mobile devices to send instant messages that can carry much more information than the short message service (SMS messages, but would be free to use, notwithstanding the price of getting online. We present a prototype IM system that can be used as a viable means of communicating and learning in higher education establishments. There is some evidence to show that learning using mobile devices reduces the formality of the learning experience, and helps engage reluctant learners and raise their self-confidence. In order for the learning process to be successful in online distance learning, unlike in the traditional face-to-face learning, attention must be paid to developing the participants' sense of community within their particular group. Instant messaging – or IM – is a natural medium for online community building and asynchronous/ synchronous peer discussions.

  14. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  15. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.

    Science.gov (United States)

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-04-19

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.

  16. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  17. Investigation on network utilization efficiency and image transmission time for the PACS network

    International Nuclear Information System (INIS)

    Tawara, K.; Nishihara, E.; Komatsu, K.I.

    1987-01-01

    The authors investigated the following features of a PACS network: (1) network utilization efficiency and (2) image transmission time. They changed the following parameters, which the two items shown above depend on: (1) transfer rate between imaging equipment and network (10 kB/econd-8 MB/second), (2) network transmission speed (100 kB/second-50 MB/second), (3) packet length (10 kB-4 MB), and (4) message length (image data) (64 kB-4 MB). As a result, a conventional-type network cannot meet a need for PACS. To solve this problem, the authors propose a multiplexed network that consists of the high-speed network for image transmission and the conventional speed of control network for commands and shorter messages. If the packet length of the image network is designed to be variable, they can choose an optimum packet length for image transmission

  18. Research on Innovating, Applying Multiple Paths Routing Technique Based on Fuzzy Logic and Genetic Algorithm for Routing Messages in Service - Oriented Routing

    Directory of Open Access Journals (Sweden)

    Nguyen Thanh Long

    2015-02-01

    Full Text Available MANET (short for Mobile Ad-Hoc Network consists of a set of mobile network nodes, network configuration changes very fast. In content based routing, data is transferred from source node to request nodes is not based on destination addresses. Therefore, it is very flexible and reliable, because source node does not need to know destination nodes. If We can find multiple paths that satisfies bandwidth requirement, split the original message into multiple smaller messages to transmit concurrently on these paths. On destination nodes, combine separated messages into the original message. Hence it can utilize better network resources, causes data transfer rate to be higher, load balancing, failover. Service Oriented Routing is inherited from the model of content based routing (CBR, combined with several advanced techniques such as Multicast, multiple path routing, Genetic algorithm to increase the data rate, and data encryption to ensure information security. Fuzzy logic is a logical field study evaluating the accuracy of the results based on the approximation of the components involved, make decisions based on many factors relative accuracy based on experimental or mathematical proof. This article presents some techniques to support multiple path routing from one network node to a set of nodes with guaranteed quality of service. By using these techniques can decrease the network load, congestion, use network resources efficiently.

  19. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  20. Between likes and shares: effects of emotional appeal and virality on the persuasiveness of anticyberbullying messages on Facebook.

    Science.gov (United States)

    Alhabash, Saleem; McAlister, Anna R; Hagerstrom, Amy; Quilliam, Elizabeth Taylor; Rifon, Nora J; Richards, Jef I

    2013-03-01

    Growth in the popularity of social networking sites (SNSs) such as Facebook has been accompanied by unintended negative results (e.g., cyberbullying). SNSs could offer solutions, as well. In this article, we explore the persuasive effects of the emotional appeal and message virality of Facebook status updates. Using status updates for a fictitious anticyberbullying organization, we conducted a 3×2×2×3 (emotional tone × affective evaluation × viral reach × message repetition) mixed factorial experiment (N=365). Positive messages resulted in more positive message evaluations and stronger anticyberbullying attitudes and viral behavioral intentions. Further, low message virality led to the most favorable message evaluations, while high virality resulted in stronger anticyberbullying attitudes.

  1. An adaptive routing strategy for packet delivery in complex networks

    International Nuclear Information System (INIS)

    Zhang, Huan; Liu, Zonghua; Tang, Ming; Hui, P.M.

    2007-01-01

    We present an efficient routing approach for delivering packets in complex networks. On delivering a message from a node to a destination, a node forwards the message to a neighbor by estimating the waiting time along the shortest path from each of its neighbors to the destination. This projected waiting time is dynamical in nature and the path through which a message is delivered would be adapted to the distribution of messages in the network. Implementing the approach on scale-free networks, we show that the present approach performs better than the shortest-path approach and another approach that takes into account of the waiting time only at the neighboring nodes. Key features in numerical results are explained by a mean field theory. The approach has the merit that messages are distributed among the nodes according to the capabilities of the nodes in handling messages

  2. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  3. 78 FR 45544 - Advisory Committee for Women's Services; Notice of Meeting

    Science.gov (United States)

    2013-07-29

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Substance Abuse and Mental Health Services Administration... given of a meeting of the Substance Abuse and Mental Health Services Administration's (SAMHSA) Advisory... Health Reform with a Focus on Women's Services, NASADAD Women's Services Network (WSN), The Women's...

  4. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-02-13

    ... Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) Communications Security, Reliability, and...

  5. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more

  6. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. First generation protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs

  7. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  8. 77 FR 69869 - National Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug...

    Science.gov (United States)

    2012-11-21

    ... Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and National Cancer Advisory Board... Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and National...: National Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and...

  9. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  10. Mentorship through advisory colleges.

    Science.gov (United States)

    Murr, Andrew H; Miller, Carol; Papadakis, Maxine

    2002-11-01

    Medical students face pressures ranging from the need to create a social network to learning vast amounts of scientific material. Students often feel isolated in this system and lack mentorship. In order to counteract feelings of bureaucratic anonymity and isolation, the University of California San Francisco has created an advisory college to foster the professional and personal growth and well being of students. UCSF has developed a formal structure to advise medical students. A selection committee, chaired by the associate dean of student affairs, appointed five faculty mentors to head advisory colleges. These five colleges serve as the advising and well-being infrastructure for the students. Mentors were chosen from a balanced range of clinical disciplines, both primary and specialty. The disciplines are obstetrics-gynecology, otolaryngology/head and neck surgery, medicine, pediatrics, and psychiatry. The mentors have demonstrated excellence in advising and counseling of students. Mentors meet individually at the beginning of the academic year with incoming first-year and second-year students. They then have bimonthly meetings with eight to ten students within each college throughout the academic year. Curricula for these group sessions include well-being discussions and coping techniques, sessions on the hidden and informal curriculum of professionalism, and discussions on career choices and strategies. For third-year students, advisory college meetings are scheduled during intersessions, which are weeklong courses that occur between the eight-week clerkship blocks. Mentors are available throughout the year to meet with students on an as-needed basis, and advisory colleges may hold group social activities. The dean's office supports each mentor with 20% salary and provides administrative support for the group college activities. Historically, UCSF students feel they receive an excellent education and appropriate job opportunities, but they do not feel they

  11. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Science.gov (United States)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  12. Maintenance of family networks

    DEFF Research Database (Denmark)

    marsico, giuseppina; Chaudhary, N; Valsiner, Jaan

    2015-01-01

    Families are social units that expand in time (across generations) and space (as a geographically distributed sub-structures of wider kinship networks). Understanding of intergenerational family relations thus requires conceptualization of communication processes that take place within a small...... collective of persons linked with one another by a flexible social network. Within such networks, Peripheral Communication Patterns set the stage for direct everyday life activities within the family context. Peripheral Communication Patterns are conditions where one family network member (A) communicates...... manifestly with another member (B) with the aim of bringing the communicative message to the third member (C) who is present but is not explicitly designated as the manifest addressee of the intended message. Inclusion of physically non-present members of the family network (elders living elsewhere, deceased...

  13. 75 FR 36373 - Federal Advisory Committee; Advisory Council on Dependents' Education

    Science.gov (United States)

    2010-06-25

    ..., the Department of Defense announces that the Advisory Council on Dependents' Education will meet on... response to the stated agenda of the planned meeting of the Advisory Council on Dependents' Education. All... membership for their consideration. For the next meeting of the Advisory Council on Dependents' Education, Dr...

  14. Heterogeneous Network Convergence with Artificial Mapping for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Hang QIN

    2013-04-01

    Full Text Available The artificial mapping scheme is proposed in this paper for adaptive network collaboration of cognitive radio networks. The superiority of the DHT-based overlay for its link state aggregation property, which establishes global convergence for link state aggregation message among a scalable number of nodes, is considered in the analysis. In addition, the fuzzy logic inference can better handle uncertainty, fuzziness, and incomplete information in node convergence report, which is developed as a novel approach to aggregate wireless node control with affordable message overload. The Artificial Mapping Tree (AMT for the new convergence scheme is verified by the simulation and experimental results. The moderately increased network throughput for convergence validation is demonstrated with the proactive spectrum coordination.

  15. Layered virus protection for the operations and administrative messaging system

    Science.gov (United States)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  16. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Directory of Open Access Journals (Sweden)

    P Gokulakrishnan

    Full Text Available A Road Accident Prevention (RAP scheme based on Vehicular Backbone Network (VBN structure is proposed in this paper for Vehicular Ad-hoc Network (VANET. The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i the Road Side Unit (RSU constructs a Prediction Report (PR based on the status of the vehicles and traffic in the highway roads, (ii the RSU generates an Emergency Warning Message (EWM based on an abnormal PR, (iii the RSU forms a VBN structure and (iv the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF and travels in High Risk Zone (HRZ. These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure. The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  17. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Science.gov (United States)

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  18. 75 FR 22757 - Federal Advisory Committee; Army Education Advisory Committee; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ..., school curriculums, educational philosophy and objectives, program effectiveness, facilities, staff and... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Army Education Advisory... Defense gives notice that it is renewing the charter for the Army Education Advisory Committee (hereafter...

  19. Confirm Content Validity and Sender Authenticity for Text Messages by Using QR Code

    Directory of Open Access Journals (Sweden)

    Firas Mohammed Aswad

    2018-05-01

    Full Text Available In light of the information revolution taking place in the modern world, therefore it becomes necessary and important to save this electronic messages. So we offered this technique to ensure the safety of the content of the messages and authenticity of the sender through  networks communication by converting the message's symbols to numbers , each one of this symbols (letters, numbers, symbols will converted into three digits, the first digit represents the ASCII code of the symbol , the second digit represents the frequency of this symbol in the message (the number of times this symbol is appear in the message, and the third digit represents the total number of the locations of the symbol (calculates the symbol location from the first symbol in the message to this symbol itself and blanks also calculated too .The digital signature of the sender will converted to numbers like the symbols of message we explained it before, and this numbers of the digital signature will gathering together to produce three numbers only, this number will gathering with each numbers of the message's symbols, the final  numbers will converted to QR Code , the QR Code will placed with the message and sent to the recipient. The recipient returns the steps of the sender (produce QR Code from the received message and compared it the received QR Codes, if it is match or not. The recipient will ensure that the content is secure, and confirms the authenticity of the sender.

  20. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  1. SDN-enabled hybrid emergency message transmission architecture in internet-of-vehicles

    Science.gov (United States)

    Zhu, Wanting; Gao, Deyun; Zhao, Weicheng; Zhang, Hongke; Chiang, Hua-Pei

    2018-04-01

    With the increasing number of vehicles connected to the Internet-of-Things (IoT), Internet-of-Vehicles (IoV) is becoming a hot research topic. It can improve traffic safety and efficiency and promote the development of the intelligent transportation that is a very important element in Smart Cities. As an important part of the safety application in IoV, the emergency message transmission is designed to inform all the vehicles in the relevant area timely of the accident information through the multi-hop broadcast communication. In this paper, we propose a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication. By deploying SDN-enabled central controller and RSU switches, we can obtain reliable and fast emergency message dissemination. Moreover, considering the space between the coverages of RSUs caused by the sparse deployment, we also use inter-vehicle multi-hop broadcast communication to improve the message coverage ratio by adding the packet modification module on the RSU switch. Simulation results show the feasibility and effectiveness of our proposed scheme.

  2. 75 FR 51985 - Federal Advisory Committee; Advisory Council on Dependents' Education (ACDE)

    Science.gov (United States)

    2010-08-24

    ... Advisory Council on Dependents' Education (ACDE) scheduled for September 8, 2010, is cancelled. The meeting... submit written statements to the Advisory Council on Dependents' Education about its mission and... planned meeting of the Advisory Council on Dependents' Education. All written statements shall be...

  3. Developing religiously-tailored health messages for behavioral change: Introducing the reframe, reprioritize, and reform ("3R") model.

    Science.gov (United States)

    Padela, Aasim I; Malik, Sana; Vu, Milkie; Quinn, Michael; Peek, Monica

    2018-05-01

    As community health interventions advance from being faith-placed to authentically faith-based, greater discussion is needed about the theory, practice, and ethics of delivering health messages embedded within a religious worldview. While there is much potential to leverage religion to promote health behaviors and improve health outcomes, there is also a risk of co-opting religious teachings for strictly biomedical ends. To describe the development, implementation, and ethical dimensions of a conceptual model for religiously-tailoring health messages. We used data from 6 focus groups and 19 interviews with women aged 40 and older sampled from diverse Muslim community organizations to map out how religious beliefs and values impact mammography-related behavioral, normative and control beliefs. These beliefs were further grouped into those that enhance mammography intention (facilitators) and those that impede intention (barriers). In concert with a multi-disciplinary advisory board, and by drawing upon leading theories of health behavior change, we developed the "3R" model for crafting religiously-tailored health messages. The 3R model addresses barrier beliefs, which are beliefs that negatively impact adopting a health behavior, by (i) reframing the belief within a relevant religious worldview, (ii) reprioritizing the belief by introducing another religious belief that has greater resonance with participants, and (iii) reforming the belief by uncovering logical flaws and/or theological misinterpretations. These approaches were used to create messages for a peer-led, mosque-based, educational intervention designed to improve mammography intention among Muslim women. There are benefits and potential ethical challenges to using religiously tailored messages to promote health behaviors. Our theoretically driven 3R model aids interventionists in crafting messages that address beliefs that hinder healthy behaviors. It is particularly useful in the context of faith

  4. 76 FR 45402 - Advisory Committee; Medical Imaging Drugs Advisory Committee; Re-Establishment

    Science.gov (United States)

    2011-07-29

    .... FDA-2010-N-0002] Advisory Committee; Medical Imaging Drugs Advisory Committee; Re- Establishment... (FDA) is announcing the re- establishment of the Medical Imaging Drugs Advisory Committee in FDA's Center for Drug Evaluation and Research. This rule amends the current language for the Medical Imaging...

  5. TTEthernet for Integrated Spacecraft Networks

    Science.gov (United States)

    Loveless, Andrew

    2015-01-01

    Aerospace projects have traditionally employed federated avionics architectures, in which each computer system is designed to perform one specific function (e.g. navigation). There are obvious downsides to this approach, including excessive weight (from so much computing hardware), and inefficient processor utilization (since modern processors are capable of performing multiple tasks). There has therefore been a push for integrated modular avionics (IMA), in which common computing platforms can be leveraged for different purposes. This consolidation of multiple vehicle functions to shared computing platforms can significantly reduce spacecraft cost, weight, and design complexity. However, the application of IMA principles introduces significant challenges, as the data network must accommodate traffic of mixed criticality and performance levels - potentially all related to the same shared computer hardware. Because individual network technologies are rarely so competent, the development of truly integrated network architectures often proves unreasonable. Several different types of networks are utilized - each suited to support a specific vehicle function. Critical functions are typically driven by precise timing loops, requiring networks with strict guarantees regarding message latency (i.e. determinism) and fault-tolerance. Alternatively, non-critical systems generally employ data networks prioritizing flexibility and high performance over reliable operation. Switched Ethernet has seen widespread success filling this role in terrestrial applications. Its high speed, flexibility, and the availability of inexpensive commercial off-the-shelf (COTS) components make it desirable for inclusion in spacecraft platforms. Basic Ethernet configurations have been incorporated into several preexisting aerospace projects, including both the Space Shuttle and International Space Station (ISS). However, classical switched Ethernet cannot provide the high level of network

  6. Big sized players on the European Union’s financial advisory market

    Directory of Open Access Journals (Sweden)

    Nicolae, C.

    2013-06-01

    Full Text Available The paper presents the activity and the objectives of “The Big Four” Group of Financial Advisory Firms. The “Big Four” are the four largest international professional services networks in accountancy and professional services, offering audit, assurance, tax, consulting, advisory, actuarial, corporate finance and legal services. They handle the vast majority of audits for publicly traded companies as well as many private companies, creating an oligopoly in auditing large companies. It is reported that the Big Four audit all but one of the companies that constitute the FTSE 100, and 240 of the companies in the FTSE 250, an index of the leading mid-cap listing companies.

  7. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2011-11-28

    ... alerting systems, 9-1-1 location accuracy, and network security. The FCC will attempt to accommodate as... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) third Communications Security, Reliability, and...

  8. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  9. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  10. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  11. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  12. 76 FR 29752 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2011-05-23

    ... Management, for the purpose of identifying leading business practices that have the potential to improve...'s Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY: Office...: The President's Management Advisory Board, a Federal Advisory Committee established in accordance with...

  13. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    , and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society.......the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...

  14. Message framing strategies to increase influenza immunization uptake among pregnant African American women.

    Science.gov (United States)

    Marsh, Heather A; Malik, Fauzia; Shapiro, Eve; Omer, Saad B; Frew, Paula M

    2014-09-01

    We explored the attitudes, opinions, and concerns of African American women regarding influenza vaccination during pregnancy. As influenza immunization coverage rates remain suboptimal in the United States among this population, we elicited message framing strategies for multicomponent interventions aimed at decreasing future incident cases of maternal and neonatal influenza. Semi-structured in-depth interviews (N = 21) were conducted with pregnant African American women at urban OB/GYN clinics who had not received an influenza vaccine. Interviews were transcribed, subjected to intercoder reliability assessment, and content analyzed to identify common thematic factors related to acceptance of the influenza vaccine and health communication message preferences. Four major themes were identified. These were communication approaches, normal vaccine behavior, pregnancy vaccination, and positive versus negative framing. Two strong themes emerged: positively-framed messages were preferred over negatively-framed messages and those emphasizing the health of the infant. Additionally, previous immunization, message source, and vaccine misperceptions also played important roles in decision-making. The majority of women indicated that positively framed messages focusing on the infant's health would encourage them to receive an influenza vaccine. Messages emphasizing immunization benefits such as protection against preterm birth and low birth weight outcomes have potential to overcome widespread negative community perceptions and cultural beliefs. Additionally, messages transmitted via interpersonal networks and social media strongly influence motivation to obtain vaccination during pregnancy. The findings of this study will assist in developing tailored messages that change pregnant African American women's influenza vaccination decision-making to achieve improved coverage.

  15. IAEA advisory group meeting on technical aspects of atomic and molecular data processing and exchange (16. meeting of the A+M Data Centres and ALADDIN network). Summary report

    Energy Technology Data Exchange (ETDEWEB)

    Stephens, J A [ed.

    2001-12-01

    The proceedings of the IAEA Advisory group meeting on technical aspects of atomic and molecular data processing and exchange (16. meeting of A+M Data centers and ALADDIN Network), held on September 10-11, 2001 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A+M data compilation and evaluation, and on the technical aspects of data processing, exchange and distribution are also presented. (author)

  16. 75 FR 9184 - Federal Advisory Committee; Advisory Council on Dependents' Education; Open Meeting

    Science.gov (United States)

    2010-03-01

    ... 102-3.150, the Department of Defense announces that the Advisory Council on Dependents' Education will... Advisory Council on Dependents' Education about its mission and functions. Written statements may be... Advisory Council on Dependents' Education, Mr. Charles Toth, telephone (703) 588-3105, 4040 North Fairfax...

  17. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  18. 76 FR 52016 - NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2011-08-19

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-074)] NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel; Meeting AGENCY: National Aeronautics and Space... meeting of the NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel...

  19. Strengthening and sustainability of national immunization technical advisory groups (NITAGs) globally: Lessons and recommendations from the founding meeting of the global NITAG network.

    Science.gov (United States)

    Adjagba, Alex; MacDonald, Noni E; Ortega-Pérez, Inmaculada; Duclos, Philippe

    2017-05-25

    National Immunization Technical Advisory Groups (NITAGs) provide independent, evidence-informed advice to assist their governments in immunization policy formation. However, many NITAGs face challenges in fulfilling their roles. Hence the many requests for formation of a network linking NITAGs together so they can learn from each other. To address this request, the Health Policy and Institutional Development (HPID) Center (a WHO Collaborating Center at the Agence de Médecine Préventive - AMP), in collaboration with WHO, organized a meeting in Veyrier-du-Lac, France, on 11 and 12 May 2016, to establish a Global NITAG Network (GNN). The meeting focused on two areas: the requirements for (a) the establishment of a global NITAG collaborative network; and (b) the global assessment/evaluation of the performance of NITAGs. 35 participants from 26 countries reviewed the proposed GNN framework documents and NITAG performance evaluation. Participants recommended that a GNN should be established, agreed on its governance, function, scope and a proposed work plan as well as setting a framework for NITAG evaluation. Copyright © 2017.

  20. IAEA advisory group meeting on technical aspects of atomic and molecular data processing and exchange (15. meeting of the A+M data centres and ALADDIN network). Summary report

    International Nuclear Information System (INIS)

    Stephens, J.A.

    1999-12-01

    The proceedings of the IAEA Advisory Group Meeting on 'Technical Aspects of Atomic and Molecular Data Processing and Exchange' (15th Meeting of A+M Data Centres and ALADDIN Network), held on September 13-14, 1999 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A+M data compilation and evaluation, and on the technical aspects of data processing, exchange, and distribution are also presented. (author)

  1. When message-frame fits salient cultural-frame, messages feel more persuasive

    OpenAIRE

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  2. Distributed Remote Vector Gaussian Source Coding for Wireless Acoustic Sensor Networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    In this paper, we consider the problem of remote vector Gaussian source coding for a wireless acoustic sensor network. Each node receives messages from multiple nodes in the network and decodes these messages using its own measurement of the sound field as side information. The node’s measurement...... and the estimates of the source resulting from decoding the received messages are then jointly encoded and transmitted to a neighboring node in the network. We show that for this distributed source coding scenario, one can encode a so-called conditional sufficient statistic of the sources instead of jointly...

  3. Sentiment analysis to determine the impact of online messages on smokers' choices to use varenicline.

    Science.gov (United States)

    Cobb, Nathan K; Mays, Darren; Graham, Amanda L

    2013-12-01

    Social networks are a prominent component of online smoking cessation interventions. This study applied sentiment analysis-a data processing technique that codes textual data for emotional polarity-to examine how exposure to messages about the cessation drug varenicline affects smokers' decision making around its use. Data were from QuitNet, an online social network dedicated to smoking cessation and relapse prevention. Self-reported medication choice at registration and at 30 days was coded among new QuitNet registrants who participated in at least one forum discussion mentioning varenicline between January 31, 2005 and March 9, 2008. Commercially available software was used to code the sentiment of forum messages mentioning varenicline that occurred during this time frame. Logistic regression analyses examined whether forum message exposure predicted medication choice. The sample of 2132 registrants comprised mostly women (78.3%), white participants (83.4%), averaged 41.2 years of age (SD = 10.9), and smoked on average 21.5 (SD = 9.7) cigarettes/day. After adjusting for potential confounders, as exposure to positive varenicline messages outweighed negative messages, the odds of switching to varenicline (odds ratio = 2.05, 95% confidence interval = 1.66 to 2.54) and continuing to use varenicline (odds ratio = 2.46, 95% confidence interval = 1.96 to 3.10) statistically significantly increased. Sentiment analysis is a useful tool for analyzing text-based data to examine their impact on behavior change. Greater exposure to positive sentiment in online conversations about varenicline is associated with a greater likelihood that smokers will choose to use varenicline in a quit attempt.

  4. 76 FR 52642 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-08-23

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... Strategic Command Strategic Advisory Group. DATES: November 1, 2011, from 8 a.m. to 5 p.m. and November 2...

  5. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  6. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  7. Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vinod Namboodiri

    2011-01-01

    Full Text Available Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. We present Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver during protocol execution. Alert is designed to handle multiple simultaneous messages from different nodes efficiently and reliably, minimizing the overall delay to collect all messages along with the delay to get the first message. Moreover, the ability of the network to handle a large number of simultaneous messages does not come at the cost of excessive delays when only a few messages need to be handled. We analyze Alert and evaluate its feasibility and performance with an implementation on commodity hardware. We further compare Alert with existing approaches through simulations and show the performance improvement possible through Alert.

  8. Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults

    Science.gov (United States)

    Subrahmanyam, Kaveri; Reich, Stephanie M.; Waechter, Natalia; Espinoza, Guadalupe

    2008-01-01

    Social networking sites (e.g., MySpace and Facebook) are popular online communication forms among adolescents and emerging adults. Yet little is known about young people's activities on these sites and how their networks of "friends" relate to their other online (e.g., instant messaging) and offline networks. In this study, college students…

  9. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  10. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  11. National Child Traumatic Stress Network

    Science.gov (United States)

    ... Safety Effects of Trauma The 3 R's: School Crises and Disasters Service Interventions Resources for Schools Trauma ... Center National Advisory Board Steering Committee Network Members Organizational Members Affiliated Professionals Geographical Map NCTSN Position Statements ...

  12. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  13. Study on Dissemination Patterns in Location-Aware Gossiping Networks

    Science.gov (United States)

    Kami, Nobuharu; Baba, Teruyuki; Yoshikawa, Takashi; Morikawa, Hiroyuki

    We study the properties of information dissemination over location-aware gossiping networks leveraging location-based real-time communication applications. Gossiping is a promising method for quickly disseminating messages in a large-scale system, but in its application to information dissemination for location-aware applications, it is important to consider the network topology and patterns of spatial dissemination over the network in order to achieve effective delivery of messages to potentially interested users. To this end, we propose a continuous-space network model extended from Kleinberg's small-world model applicable to actual location-based applications. Analytical and simulation-based study shows that the proposed network achieves high dissemination efficiency resulting from geographically neutral dissemination patterns as well as selective dissemination to proximate users. We have designed a highly scalable location management method capable of promptly updating the network topology in response to node movement and have implemented a distributed simulator to perform dynamic target pursuit experiments as one example of applications that are the most sensitive to message forwarding delay. The experimental results show that the proposed network surpasses other types of networks in pursuit efficiency and achieves the desirable dissemination patterns.

  14. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  15. Interaction patterns of nurturant support exchanged in online health social networking.

    Science.gov (United States)

    Chuang, Katherine Y; Yang, Christopher C

    2012-05-03

    Expressing emotion in online support communities is an important aspect of enabling e-patients to connect with each other and expand their social resources. Indirectly it increases the amount of support for coping with health issues. Exploring the supportive interaction patterns in online health social networking would help us better understand how technology features impacts user behavior in this context. To build on previous research that identified different types of social support in online support communities by delving into patterns of supportive behavior across multiple computer-mediated communication formats. Each format combines different architectural elements, affecting the resulting social spaces. Our research question compared communication across different formats of text-based computer-mediated communication provided on the MedHelp.org health social networking environment. We identified messages with nurturant support (emotional, esteem, and network) across three different computer-mediated communication formats (forums, journals, and notes) of an online support community for alcoholism using content analysis. Our sample consisted of 493 forum messages, 423 journal messages, and 1180 notes. Nurturant support types occurred frequently among messages offering support (forum comments: 276/412 messages, 67.0%; journal posts: 65/88 messages, 74%; journal comments: 275/335 messages, 82.1%; and notes: 1002/1180 messages, 84.92%), but less often among messages requesting support. Of all the nurturing supports, emotional (ie, encouragement) appeared most frequently, with network and esteem support appearing in patterns of varying combinations. Members of the Alcoholism Community appeared to adapt some traditional face-to-face forms of support to their needs in becoming sober, such as provision of encouragement, understanding, and empathy to one another. The computer-mediated communication format may have the greatest influence on the supportive interactions

  16. "Pervy Role-Play and Such": Girls' Experiences of Sexual Messaging Online

    Science.gov (United States)

    Nielsen, Silja; Paasonen, Susanna; Spisak, Sanna

    2015-01-01

    Sexting is one of the recurring causes of concern in public discussion of young people and network media. This paper builds on findings from a survey with 1269 Finnish female respondents aged 11-18 conducted using a popular online community for girls on their experiences of and views on online messages concerning sex and sexuality. Sixty-five per…

  17. Resilient In-Network Aggregation for Vehicular Networks

    NARCIS (Netherlands)

    Dietzel, Stefan

    2015-01-01

    Applications for vehicular ad hoc networks (VANETs) are an active field of re- search with the potential to significantly contribute to driver safety, traffic efficiency, and comfort. Messages are typically exchanged and forwarded between vehicles using wireless communication, thereby creating a

  18. Improved Degree Search Algorithms in Unstructured P2P Networks

    Directory of Open Access Journals (Sweden)

    Guole Liu

    2012-01-01

    Full Text Available Searching and retrieving the demanded correct information is one important problem in networks; especially, designing an efficient search algorithm is a key challenge in unstructured peer-to-peer (P2P networks. Breadth-first search (BFS and depth-first search (DFS are the current two typical search methods. BFS-based algorithms show the perfect performance in the aspect of search success rate of network resources, while bringing the huge search messages. On the contrary, DFS-based algorithms reduce the search message quantity and also cause the dropping of search success ratio. To address the problem that only one of performances is excellent, we propose two memory function degree search algorithms: memory function maximum degree algorithm (MD and memory function preference degree algorithm (PD. We study their performance including the search success rate and the search message quantity in different networks, which are scale-free networks, random graph networks, and small-world networks. Simulations show that the two performances are both excellent at the same time, and the performances are improved at least 10 times.

  19. Drivers' smart advisory system improves driving performance at STOP sign intersections

    Directory of Open Access Journals (Sweden)

    Qing Li

    2017-06-01

    Full Text Available STOP signs are often physically blocked by obstacles at the corner, forming a safety threat. To enhance the safety at an un-signalized intersection like a STOP sign intersection, a radio frequency identification (RFID based drivers smart advisory system (DSAS was developed, which provides drivers with an earlier warning message when they are approaching an un-signalized intersection. In this research, a pilot field test was conducted with the DSAS alarm on an approach towards a STOP sign intersection in a residential area in Houston, Texas. The designed test route covers all turning movements, including left turn, through movement, and right turn. GPS units recorded test drivers' driving behaviors. A self-developed MATLAB program and statistically significant difference t-test were applied to analyze the impacts of the DSAS messages on drivers' driving performance, in terms of approaching speed profile, acceleration/deceleration rates, braking distance, and possible extra vehicle emissions induced by the introduction of the DSAS message. Drivers' preference on the DSAS was investigated by a designed survey questionnaire among test drivers. Results showed that the DSAS alarm was able to induce drivers to drive significantly slower to approach a STOP sign intersection, perform smaller fluctuation in acceleration/deceleration rates, and be more aware of a coming STOP sign indicated by decelerating earlier. All test drivers preferred to follow the DSAS alarm on roads for a safety concern. Further, the DSAS alarm caused the reduction in emission rates through movement. For a general observation, more road tests with more participants and different test routes were recommended.

  20. 77 FR 25706 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2012-05-01

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... [[Page 25707

  1. Computer Conferencing and Electronic Messaging. Conference Proceedings (Guelph, Ontario, Canada, January 22-23, 1985).

    Science.gov (United States)

    Guelph Univ. (Ontario).

    This 21-paper collection examines various issues in electronic networking and conferencing with computers, including design issues, conferencing in education, electronic messaging, computer conferencing applications, social issues of computer conferencing, and distributed computer conferencing. In addition to a keynote address, "Computer…

  2. 47 CFR 11.20 - State Relay Network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS messages...

  3. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Science.gov (United States)

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  4. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    Science.gov (United States)

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  5. Topology design and performance analysis of an integrated communication network

    Science.gov (United States)

    Li, V. O. K.; Lam, Y. F.; Hou, T. C.; Yuen, J. H.

    1985-01-01

    A research study on the topology design and performance analysis for the Space Station Information System (SSIS) network is conducted. It is begun with a survey of existing research efforts in network topology design. Then a new approach for topology design is presented. It uses an efficient algorithm to generate candidate network designs (consisting of subsets of the set of all network components) in increasing order of their total costs, and checks each design to see if it forms an acceptable network. This technique gives the true cost-optimal network, and is particularly useful when the network has many constraints and not too many components. The algorithm for generating subsets is described in detail, and various aspects of the overall design procedure are discussed. Two more efficient versions of this algorithm (applicable in specific situations) are also given. Next, two important aspects of network performance analysis: network reliability and message delays are discussed. A new model is introduced to study the reliability of a network with dependent failures. For message delays, a collection of formulas from existing research results is given to compute or estimate the delays of messages in a communication network without making the independence assumption. The design algorithm coded in PASCAL is included as an appendix.

  6. Rapid self-organised initiation of ad hoc sensor networks close above the percolation threshold

    Science.gov (United States)

    Korsnes, Reinert

    2010-07-01

    This work shows potentials for rapid self-organisation of sensor networks where nodes collaborate to relay messages to a common data collecting unit (sink node). The study problem is, in the sense of graph theory, to find a shortest path tree spanning a weighted graph. This is a well-studied problem where for example Dijkstra’s algorithm provides a solution for non-negative edge weights. The present contribution shows by simulation examples that simple modifications of known distributed approaches here can provide significant improvements in performance. Phase transition phenomena, which are known to take place in networks close to percolation thresholds, may explain these observations. An initial method, which here serves as reference, assumes the sink node starts organisation of the network (tree) by transmitting a control message advertising its availability for its neighbours. These neighbours then advertise their current cost estimate for routing a message to the sink. A node which in this way receives a message implying an improved route to the sink, advertises its new finding and remembers which neighbouring node the message came from. This activity proceeds until there are no more improvements to advertise to neighbours. The result is a tree network for cost effective transmission of messages to the sink (root). This distributed approach has potential for simple improvements which are of interest when minimisation of storage and communication of network information are a concern. Fast organisation of the network takes place when the number k of connections for each node ( degree) is close above its critical value for global network percolation and at the same time there is a threshold for the nodes to decide to advertise network route updates.

  7. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.

  8. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  9. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  10. Line-plane broadcasting in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  11. IAEA advisory group meeting on 'Technical Aspects of Atomic and Molecular Data Processing and Exchange' (14th meeting of the A + M data centres and ALADDIN network). Summary report

    International Nuclear Information System (INIS)

    Stephens, A.

    1998-01-01

    The proceedings of the IAEA Advisory Group Meeting on ''Technical Aspects of Atomic and Molecular Data Processing and Exchange (14th Meeting of A + M Data Centres and ALADDIN Network)'', held on July 21-22, 1997 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A + M data compilation and evaluation, and on the technical aspects of data processing and exchange are also presented. The document includes 15 reports from various Data Centres

  12. 77 FR 64335 - Notification of a Public Teleconference of the Science Advisory Board; Perchlorate Advisory Panel

    Science.gov (United States)

    2012-10-19

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL--9743-2] Notification of a Public Teleconference of the Science Advisory Board; Perchlorate Advisory Panel AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency (EPA) Science Advisory Board (SAB) Staff Office...

  13. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  14. Contention Aware Routing for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin Han; Naik, Sagar; Shihada, Basem

    2011-01-01

    This paper introduces a novel multi-copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of miniature devices such as smart phones, hand-held devices, and sensors mounted in fixed or mobile objects. SAURP aims to explore the possibility of taking mobile nodes as message carriers in order for end-to-end delivery of the messages. The best carrier for a message is determined by the prediction result using a novel contact model, where the network status, including wireless link condition and nodal buffer availability, are jointly considered. The paper argues and proves that the nodal movement and the predicted collocation with the message recipient can serve as meaningful information to achieve an intelligent message forwarding decision at each node. The proposed protocol has been implemented and compared with a number of existing encounter-based routing approaches in terms of delivery delay, and the number of transmissions required for message delivery. The simulation results show that the proposed SAURP outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  15. Contention Aware Routing for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed

    2011-08-21

    This paper introduces a novel multi-copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of miniature devices such as smart phones, hand-held devices, and sensors mounted in fixed or mobile objects. SAURP aims to explore the possibility of taking mobile nodes as message carriers in order for end-to-end delivery of the messages. The best carrier for a message is determined by the prediction result using a novel contact model, where the network status, including wireless link condition and nodal buffer availability, are jointly considered. The paper argues and proves that the nodal movement and the predicted collocation with the message recipient can serve as meaningful information to achieve an intelligent message forwarding decision at each node. The proposed protocol has been implemented and compared with a number of existing encounter-based routing approaches in terms of delivery delay, and the number of transmissions required for message delivery. The simulation results show that the proposed SAURP outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  16. Remote control of data acquisition devices by means of message oriented middleware

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I.

    2007-01-01

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized

  17. Remote control of data acquisition devices by means of message oriented middleware

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)], E-mail: edi.sanchez@ciemat.es; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)

    2007-10-15

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized.

  18. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  19. Starting Off on the Best Foot: A Review of Message Framing and Message Tailoring, and Recommendations for the Comprehensive Messaging Strategy for Sustained Behavior Change.

    Science.gov (United States)

    Pope, J Paige; Pelletier, Luc; Guertin, Camille

    2018-09-01

    Health promotion programs represent a salient means through which physical activity promoters can cultivate positive health behavior change and maintenance. The messages communicated within these programs serve as an essential component as they are often used to convey valuable information, resources, or tools that facilitate health behavior initiation and sustained engagement. Identifying the most effective way to communicate health promotion information is, therefore, of considerable importance to ensuring that people not only attend to these messages, but also connect with and internalize the information conveyed within them. This paper was written to (1) summarize and evaluate the most prominent reviewed research approaches of message framing and tailoring to message design; and (2) offer a comprehensive messaging strategy to promote sustained health behavior change. A review of the literature demonstrated that a messaging strategy that has consistently led to healthy behavior change has yet to be identified. Furthermore, scholars have articulated that a multi-theoretical approach that places emphasis on facilitating motivation and healthy behavior change needs to be employed. Thus, this paper proposes and provides recommendations for employing the Comprehensive Messaging Strategy for Sustained Behavior Change (CMSSBC), which advocates tailoring messages to peoples' stage of change and framing them to focus on self-determined motives and intrinsic goals.

  20. Connection Setup Signaling Scheme with Flooding-Based Path Searching for Diverse-Metric Network

    Science.gov (United States)

    Kikuta, Ko; Ishii, Daisuke; Okamoto, Satoru; Oki, Eiji; Yamanaka, Naoaki

    Connection setup on various computer networks is now achieved by GMPLS. This technology is based on the source-routing approach, which requires the source node to store metric information of the entire network prior to computing a route. Thus all metric information must be distributed to all network nodes and kept up-to-date. However, as metric information become more diverse and generalized, it is hard to update all information due to the huge update overhead. Emerging network services and applications require the network to support diverse metrics for achieving various communication qualities. Increasing the number of metrics supported by the network causes excessive processing of metric update messages. To reduce the number of metric update messages, another scheme is required. This paper proposes a connection setup scheme that uses flooding-based signaling rather than the distribution of metric information. The proposed scheme requires only flooding of signaling messages with requested metric information, no routing protocol is required. Evaluations confirm that the proposed scheme achieves connection establishment without excessive overhead. Our analysis shows that the proposed scheme greatly reduces the number of control messages compared to the conventional scheme, while their blocking probabilities are comparable.

  1. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  2. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  3. Impact of Cultural Exposure and Message Framing on Oral Health Behavior: Exploring the Role of Message Memory.

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N; Updegraff, John A; Ehret, Phillip J; Areguin, Maira A; Sherman, David K

    2016-10-01

    Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically choose message features to promote adherence to recommended behaviors. We present exposure to US culture as a moderator of the impact of gain-frame versus loss-frame messages. Since US culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to US culture would show these advantages for loss-framed messages. 223 participants viewed a written oral health message in 1 of 3 randomized conditions-gain-frame, loss-frame, or no-message control-and were given 10 flosses. Cultural exposure was measured with the proportions of life spent and parents born in the US. At baseline and 1 week later, participants completed recall tests and reported recent flossing behavior. Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over 1 week; for example, those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. In health care settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. © The Author(s) 2015.

  4. Advisory Committee Handbook.

    Science.gov (United States)

    Black Hawk Coll., Moline, IL.

    An advisory committee is generally comprised of persons outside the education profession who have specialized knowledge in a given area. The committee advises, makes recommendations, and gives service to the college and its students, instructors, and administrators. At Black Hawk College, there are four types of advisory committees: community,…

  5. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  6. Exploring bi-directional and SMS messaging for communications between Public Health Agencies and their stakeholders: a qualitative study.

    Science.gov (United States)

    Revere, Debra; Calhoun, Rebecca; Baseman, Janet; Oberle, Mark

    2015-07-08

    Communication technologies that enable bi-directional/two-way communications and cell phone texting (SMS) between public health agencies and their stakeholders may improve public health surveillance, ensure targeted distribution of alerts to hard-to-reach populations, reduce mortality and morbidity in an emergency, and enable a crucial feedback loop between public health agencies and the communities they serve. Building on prior work regarding health care provider preferences for receiving one-way public health communications by email, fax or SMS, we conducted a formative, exploratory study to understand how a bi-directional system and the incorporation of SMS in that system might be used as a strategy to send and receive messages between public health agencies and community-based organizations which serve vulnerable populations, health care providers, and public health workers. Our research question: Under what conditions and/or situations might public health agencies utilize bi-directional and/or SMS messaging for disseminating time-sensitive public health information (alerts, advisories, updates, etc.) to their stakeholders? A mixed methods (qualitative and quantitative) study was conducted between April and July 2014. Data collection included a survey distributed to health care providers and semi-structured interviews with providers, community- and government-based organization leaders and directors, and public health agency internal workforce staff. Survey respondents and interviewees were asked about their exposure to public health messages, how these messages are received and how the information in these messages are handled, and in what situations (for example, a local vs. a national event, a pandemic or emergency vs. a health update) a bi-directional and/or SMS messaging system might improve communications between public health agencies and their stakeholder group. Interview and survey data were qualitatively analyzed. Thematic codes were quantitized into

  7. Constant Companions: Instant Messaging Conversations as Sustainable Supportive Study Structures amongst Undergraduate Peers

    Science.gov (United States)

    Timmis, Sue

    2012-01-01

    Universities are facing severe cuts in funding and a transformation of both the economic model underpinning higher education and the relationship between students, tutors and universities and the traditional forms of support for students' learning may be eroded. At the same time, mobile communications, instant messaging and social networking are…

  8. Extracting Association Patterns in Network Communications

    Science.gov (United States)

    Portela, Javier; Villalba, Luis Javier García; Trujillo, Alejandra Guadalupe Silva; Orozco, Ana Lucila Sandoval; Kim, Tai-hoon

    2015-01-01

    In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense. PMID:25679311

  9. Extracting Association Patterns in Network Communications

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2015-02-01

    Full Text Available In network communications, mixes provide protection against observers hiding the appearance of messages, patterns, length and links between senders and receivers. Statistical disclosure attacks aim to reveal the identity of senders and receivers in a communication network setting when it is protected by standard techniques based on mixes. This work aims to develop a global statistical disclosure attack to detect relationships between users. The only information used by the attacker is the number of messages sent and received by each user for each round, the batch of messages grouped by the anonymity system. A new modeling framework based on contingency tables is used. The assumptions are more flexible than those used in the literature, allowing to apply the method to multiple situations automatically, such as email data or social networks data. A classification scheme based on combinatoric solutions of the space of rounds retrieved is developed. Solutions about relationships between users are provided for all pairs of users simultaneously, since the dependence of the data retrieved needs to be addressed in a global sense.

  10. 75 FR 33616 - Science Advisory Board Staff Office; Notification of Closed Meetings of the Science Advisory...

    Science.gov (United States)

    2010-06-14

    ... Closed Meetings of the Science Advisory Board's Scientific and Technological Achievement Awards Committee... Agency's (EPA), Science Advisory Board (SAB) Staff Office announces a meeting and teleconference of the....gov . The SAB Mailing address is: U.S. EPA Science Advisory Board (1400F), U.S. Environmental...

  11. Competitive diffusion in online social networks with heterogeneous users

    Science.gov (United States)

    Li, Pei; He, Su; Wang, Hui; Zhang, Xin

    2014-06-01

    Online social networks have attracted increasing attention since they provide various approaches for hundreds of millions of people to stay connected with their friends. However, most research on diffusion dynamics in epidemiology cannot be applied directly to characterize online social networks, where users are heterogeneous and may act differently according to their standpoints. In this paper, we propose models to characterize the competitive diffusion in online social networks with heterogeneous users. We classify messages into two types (i.e., positive and negative) and users into three types (i.e., positive, negative and neutral). We estimate the positive (negative) influence for a user generating a given type message, which is the number of times that positive (negative) messages are processed (i.e., read) incurred by this action. We then consider the diffusion threshold, above which the corresponding influence will approach infinity, and the effect threshold, above which the unexpected influence of generating a message will exceed the expected one. We verify all these results by simulations, which show the analysis results are perfectly consistent with the simulation results. These results are of importance in understanding the diffusion dynamics in online social networks, and also critical for advertisers in viral marketing where there are fans, haters and neutrals.

  12. “You should be reading, not texting”: Understanding classroom text messaging in the constant contact society

    Directory of Open Access Journals (Sweden)

    Sarah Lohnes Watulak

    2010-10-01

    Full Text Available Cell phones are the most ubiquitous communication device owned by young people today, and students’ text messaging during class is a common occurrence in many university classrooms. Analyzing data from a qualitative study involving 34 undergraduate students at a university in the Northeastern United States, this paper seeks to explore: Why do university students text message during class, and what does this tell us about text messaging as a new literacy practice within traditional classroom settings? Drawing on perspectives from new literacies and communication studies, I argue that texting was a meaningful practice for students as it afforded the opportunity for ongoing participation in social networks, and provided a means of exercising power within the controlled space of the classroom.

  13. Characteristics and Motivational Factors of Effective Extension Advisory Leaders: Implications for Building Strong Extension Advisory Councils

    Directory of Open Access Journals (Sweden)

    Joy Kish

    2014-10-01

    Full Text Available The purpose of this study was to determine the characteristics and motivational factors of effective Extension advisory leaders. This Delphi study was conducted with a selected group of County Extension Directors and a group of Extension State Advisory Leaders. The study identified 10 characteristics that distinguish an effective Extension advisory leader. Some of these characteristics are explicit and easy to observe, while others are implicit and difficult to directly observe. Therefore, it is practical to use directly observable characteristics of effective advisory leaders when selecting volunteers. Once potential volunteers are spotted in the community, implicit characteristics of effective advisory leaders should be used to further screen them before they are selected. The study also identified the eight most important factors motivating individuals to volunteer as effective advisory leaders. Understanding these motivational factors is helpful for creating an environment for attracting and retaining effective volunteers. Understanding their motivation for volunteer work and creating an environment for them to meet the motivating factors for volunteering will lead to volunteer satisfaction and retention. The findings of this study can be used to build strong Extension advisory councils.

  14. Distributed topology control algorithm to conserve energy in heterogeneous wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-07-01

    Full Text Available in performance with the resulting topology being a sub-network of the one generated by [11]. Li and Halpern [13] further propose the small minimum energy communication network (SMECN). In this algorithm, each node u initially broadcasts a “hello” message... algorithm that runs in each node is presented as follows:- Phase1: Establishing the accessible neighbourhood topology. In this stage, node u broadcasts a “hello” message using its full power, max uP . The nodes that receive the “hello” message form...

  15. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  16. Entity-based Classification of Twitter Messages

    OpenAIRE

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  17. 76 FR 44912 - Science Advisory Board Staff Office; Notification of Closed Meetings of the Science Advisory...

    Science.gov (United States)

    2011-07-27

    ... Closed Meetings of the Science Advisory Board's Scientific and Technological Achievement Awards Committee... Agency's (EPA), Science Advisory Board (SAB) Staff Office announces a meeting and teleconference of the[email protected] . The SAB Mailing address is: U.S. EPA Science Advisory Board (1400R), U.S. Environmental...

  18. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  19. Getting the message across: age differences in the positive and negative framing of health care messages.

    Science.gov (United States)

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  20. An Intelligent Broadcasting Algorithm for Early Warning Message Dissemination in VANETs

    Directory of Open Access Journals (Sweden)

    Ihn-Han Bae

    2015-01-01

    Full Text Available Vehicular ad hoc network (VANET has gained much attention recently to improve road safety, reduce traffic congestion, and enable efficient traffic management because of its many important applications in transportation. In this paper, an early warning intelligence broadcasting algorithm is proposed, EW-ICAST, to disseminate a safety message for VANETs. The proposed EW-ICAST uses not only the early warning system on the basis of time to collision (TTC but also the intelligent broadcasting algorithm on the basis of fuzzy logic. Thus, the EW-ICAST resolves effectively broadcast storm problem and meets time-critical requirement. The performance of EW-ICAST is evaluated through simulation and compared with that of other alert message dissemination algorithms. From the simulation results, we know that EW-ICAST is superior to Simple, P-persistence, and EDB algorithms.

  1. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  2. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  3. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    NARCIS (Netherlands)

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  4. 75 FR 11883 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory...

    Science.gov (United States)

    2010-03-12

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9126-2] Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory Board (SAB) AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency (EPA) Science Advisory Board (SAB) Staff...

  5. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) environment evidence that size does matter in DoD business process engineering

    OpenAIRE

    Ramsey, Avonna S.

    2007-01-01

    Since the migration of DOD messaging to the DMS has been mandated, implementation has been less than ideal and otherwise unsuccessful. DMS users have reported dissatisfaction with the systems maintenance and security support burdens in the current client-server model. NREMS introduces a networked environment capable of push technology and centralized database and security management which should significantly reduce the DMS shortfalls that have made the system lack appeal to the end user. As ...

  6. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Directory of Open Access Journals (Sweden)

    Qaisar Ayub

    Full Text Available Delay Tolerant Network (DTN multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  7. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Science.gov (United States)

    Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan

    2018-01-01

    Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  8. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    Science.gov (United States)

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  9. The impact of cultural exposure and message framing on oral health behavior: Exploring the role of message memory

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N.; Updegraff, John A.; Ehret, Phillip J.; Areguin, Maira A.; Sherman, David K.

    2015-01-01

    Background Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically decide on message features to promote adherence to recommended behaviors. We present exposure to United States (U.S.) culture as a moderator of the impact of gain- vs. loss-frame messages. Since U.S. culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to U.S. culture would show these advantages for loss-framed messages. Methods 223 participants viewed a written oral health message in one of three randomized conditions: gain-frame, loss-frame, or no-message control, and were given ten flosses. Cultural exposure was measured with the proportions of life spent and parents born in the U.S. At baseline and one week later, participants completed recall tests and reported recent flossing behavior. Results Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over one week. E.g., those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Limitations Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. Conclusions In healthcare settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. PMID:25654986

  10. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  11. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  12. 5 CFR 724.403 - Advisory guidelines.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Advisory guidelines. 724.403 Section 724.403 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS... RETALIATION ACT OF 2002 Best Practices § 724.403 Advisory guidelines. OPM will issue advisory guidelines to...

  13. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  14. 76 FR 7199 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory...

    Science.gov (United States)

    2011-02-09

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9264-5] Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory Board Panel for the Review of EPA's Hydraulic Fracturing...-2098 or via e-mail at [email protected] . General information concerning the EPA Science Advisory...

  15. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  16. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  17. 75 FR 33616 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory...

    Science.gov (United States)

    2010-06-14

    ... a Public Meeting of the Science Advisory Board Exposure and Human Health Committee (EHHC) AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The EPA Science Advisory Board (SAB) Staff... Science Advisory Board can be found on the SAB Web site at http://www.epa.gov/sab . SUPPLEMENTARY...

  18. When communications collide with recipients' actions: effects of post-message behavior on intentions to follow the message recommendation.

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B; Kumkale, G Tarcan

    2003-07-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance.

  19. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  20. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  1. System of message for gamma-radiation monitor

    International Nuclear Information System (INIS)

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  2. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  3. 76 FR 40355 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory...

    Science.gov (United States)

    2011-07-08

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9431-7] Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory Board Panel for the Review of Great Lakes Restoration... information concerning the EPA Science Advisory Board can be found at the EPA SAB Web site at http://www.epa...

  4. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  5. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  6. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  7. Mathematical model for spreading dynamics of social network worms

    International Nuclear Information System (INIS)

    Sun, Xin; Liu, Yan-Heng; Han, Jia-Wei; Liu, Xue-Jie; Li, Bin; Li, Jin

    2012-01-01

    In this paper, a mathematical model for social network worm spreading is presented from the viewpoint of social engineering. This model consists of two submodels. Firstly, a human behavior model based on game theory is suggested for modeling and predicting the expected behaviors of a network user encountering malicious messages. The game situation models the actions of a user under the condition that the system may be infected at the time of opening a malicious message. Secondly, a social network accessing model is proposed to characterize the dynamics of network users, by which the number of online susceptible users can be determined at each time step. Several simulation experiments are carried out on artificial social networks. The results show that (1) the proposed mathematical model can well describe the spreading dynamics of social network worms; (2) weighted network topology greatly affects the spread of worms; (3) worms spread even faster on hybrid social networks

  8. 78 FR 12762 - Joint Meeting of the Medical Imaging Drugs Advisory Committee and the Oncologic Drugs Advisory...

    Science.gov (United States)

    2013-02-25

    ...] Joint Meeting of the Medical Imaging Drugs Advisory Committee and the Oncologic Drugs Advisory Committee... be open to the public. Name of Committees: Medical Imaging Drugs Advisory Committee and the Oncologic... Special Medical Programs. [FR Doc. 2013-04141 Filed 2-22-13; 8:45 am] BILLING CODE 4160-01-P ...

  9. Beyond fragmentation and disconnect: networks for knowledge sharing in the English land management advisory system

    NARCIS (Netherlands)

    Klerkx, L.W.A.; Proctor, A.

    2012-01-01

    The growing multifunctionality in agriculture, combined with privatisation of previously state-funded agricultural extension services, has resulted in a pluralistic land management advisory system. Despite benefits in terms of increased client orientation and greater advisor diversity, it is argued

  10. Productivity and quality improvements in health care through airboss mobile messaging services.

    Science.gov (United States)

    Shah, P J; Martinez, R; Cooney, E

    1997-01-01

    The US health care industry is in the midst of revolutionary changes. Under tremendous pressures from third-party payers and managed care programs to control costs while providing high quality medical services, health care entities are now looking at information technologies to help them achieve their goals. These goals typically include improved productivity, efficiency and decision-making capabilities among staff members. Moreover, hospitals and other health care facilities that provide a broad and integrated range of inpatient and outpatient care, wellness and home care services are in the best position to offer comprehensive packages to managed care and private insurers. Many health care providers and administrators are considered mobile employees. This mobility can range from intra-building and intra-campus to multi-site and metropolitan areas. This group often relies on a variety of information technologies such as personal computers, communicating laptops, pagers, cellular phones, wireline phones, cordless phones and fax machines to stay in touch and handle information needs. These health care professionals require mobile information access and messaging tools to improve communications, control accessibility and enhance decision-making capabilities. AirBoss mobile messaging services could address the health care industry's need for improved messaging capabilities for its mobile employees. The AirBoss family of services supports integrated voice services, data messaging, mobile facsimile and customized information delivery. This paper describes overview of the current mobile data networking capability, the AirBoss architecture, the health care-related applications it addresses and long-term benefits. In addition, a prototype application for mobile home health care workers is illustrated. This prototype application provides integrated e-mail, information services, web access, real-time access and update of patient records from wireline or wireless networks

  11. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  12. Network Connection Management

    CERN Document Server

    IT Department, Communication Systems and Network Group

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure a smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions....

  13. Network Connection Management

    CERN Multimedia

    IT Department

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions. Thank ...

  14. Communication of urgent public health messages to urban populations: lessons from the Massachusetts water main break.

    Science.gov (United States)

    Wang, C Jason; Little, Alison A; Holliman, Jaime Bruce; Ng, Chun Y; Barrero-Castillero, Alejandra; Fu, Chong Min; Zuckerman, Barry; Bauchner, Howard

    2011-10-01

    To study when and how an urgent public health message about a boil-water order reached an urban population after the Massachusetts water main break. In-person surveys were conducted in waiting areas of clinics and emergency departments at a large urban safety net hospital within 1 week of the event. Of 533 respondents, 97% were aware of the order; 34% of those who lived in affected cities or towns were potentially exposed to contaminated water. Among those who were aware, 98% took action. Respondents first received the message through word of mouth (33%), television (25%), cellular telephone calls (20%), landline calls (10%), and other modes of communication (12%). In multivariate analyses, foreign-born respondents and those who lived outside the city of Boston had a higher risk of exposure to contaminated water. New modes (eg, cellular telephones) were used more commonly by females and younger individuals (ages 18 to 34). Individuals who did not speak English at home were more likely to receive the message through their personal networks. Given the increasing prevalence of cellular telephone use, public officials should encourage residents to register landline and cellular telephone for emergency alerts and must develop creative ways to reach immigrants and non-English-speaking groups quickly via personal networks.

  15. 75 FR 17701 - High Energy Physics Advisory Panel

    Science.gov (United States)

    2010-04-07

    ... DEPARTMENT OF ENERGY High Energy Physics Advisory Panel AGENCY: Department of Energy, Office of... Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires... Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000 Independence...

  16. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  17. Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks

    Directory of Open Access Journals (Sweden)

    M. E. Migabo

    2017-01-01

    Full Text Available Despite its low computational cost, the Gradient Based Routing (GBR broadcast of interest messages in Wireless Sensor Networks (WSNs causes significant packets duplications and unnecessary packets transmissions. This results in energy wastage, traffic load imbalance, high network traffic, and low throughput. Thanks to the emergence of fast and powerful processors, the development of efficient network coding strategies is expected to enable efficient packets aggregations and reduce packets retransmissions. For multiple sinks WSNs, the challenge consists of efficiently selecting a suitable network coding scheme. This article proposes a Cooperative and Adaptive Network Coding for GBR (CoAdNC-GBR technique which considers the network density as dynamically defined by the average number of neighbouring nodes, to efficiently aggregate interest messages. The aggregation is performed by means of linear combinations of random coefficients of a finite Galois Field of variable size GF(2S at each node and the decoding is performed by means of Gaussian elimination. The obtained results reveal that, by exploiting the cooperation of the multiple sinks, the CoAdNC-GBR not only improves the transmission reliability of links and lowers the number of transmissions and the propagation latency, but also enhances the energy efficiency of the network when compared to the GBR-network coding (GBR-NC techniques.

  18. Improving Type Error Messages in OCaml

    OpenAIRE

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  19. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  20. Mentalizing and Information Propagation through Social Network: Evidence from a Resting-State-fMRI Study.

    Science.gov (United States)

    Zhang, Huijun; Mo, Lei

    2016-01-01

    Microblogs is one of the main social networking channels by which information is spread. Among them, Sina Weibo is one of the largest social networking channels in China. Millions of users repost information from Sina Weibo and share embedded emotion at the same time. The present study investigated participants' propensity to repost microblog messages of positive, negative, or neutral valence, and studied the neural correlates during resting state with the reposting rate of each type microblog messages. Participants preferred to repost negative messages relative to positive and neutral messages. Reposting rate of negative messages was positively correlated to the functional connectivity of temporoparietal junction (TPJ) with insula, and TPJ with dorsolateral prefrontal cortex. These results indicate that reposting negative messages is related to conflict resolution between the feeling of pain/disgust and the intention to repost significant information. Thus, resposting emotional microblog messages might be attributed to participants' appraisal of personal and recipient's interest, as well as their cognitive process for decision making.

  1. 77 FR 55863 - NASA Advisory Council; Science Committee; Earth Science Subcommittee; Applied Sciences Advisory...

    Science.gov (United States)

    2012-09-11

    ... Committee; Earth Science Subcommittee; Applied Sciences Advisory Group Meeting AGENCY: National Aeronautics... the Applied Science Advisory Group. This Subcommittee reports to the Earth Science Subcommittee... following topics: --Applied Sciences Program Update --Earth Science Data Latency Study Preliminary Update...

  2. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  3. performance performance analysis of gsm networks in minna

    African Journals Online (AJOL)

    eobe

    in terms of key performance indicators (KPI) based on statistics performance indicators ... in this study. Keywords: GSM Network, Drive Test, KPI and Radio Frequency Network Optimization. 1. .... message (SMS) traffic or in scenarios where so.

  4. Multi-processor network implementations in Multibus II and VME

    International Nuclear Information System (INIS)

    Briegel, C.

    1992-01-01

    ACNET (Fermilab Accelerator Controls Network), a proprietary network protocol, is implemented in a multi-processor configuration for both Multibus II and VME. The implementations are contrasted by the bus protocol and software design goals. The Multibus II implementation provides for multiple processors running a duplicate set of tasks on each processor. For a network connected task, messages are distributed by a network round-robin scheduler. Further, messages can be stopped, continued, or re-routed for each task by user-callable commands. The VME implementation provides for multiple processors running one task across all processors. The process can either be fixed to a particular processor or dynamically allocated to an available processor depending on the scheduling algorithm of the multi-processing operating system. (author)

  5. Competing edge networks

    Science.gov (United States)

    Parsons, Mark; Grindrod, Peter

    2012-06-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.

  6. Hand hygiene posters: selling the message.

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  7. A new XML-aware compression technique for improving performance of healthcare information systems over hospital networks.

    Science.gov (United States)

    Al-Shammary, Dhiah; Khalil, Ibrahim

    2010-01-01

    Most organizations exchange, collect, store and process data over the Internet. Many hospital networks deploy Web services to send and receive patient information. SOAP (Simple Object Access Protocol) is the most usable communication protocol for Web services. XML is the standard encoding language of SOAP messages. However, the major drawback of XML messages is the high network traffic caused by large overheads. In this paper, two XML-aware compressors are suggested to compress patient messages stemming from any data transactions between Web clients and servers. The proposed compression techniques are based on the XML structure concepts and use both fixed-length and Huffman encoding methods for translating the XML message tree. Experiments show that they outperform all the conventional compression methods and can save tremendous amount of network bandwidth.

  8. Design and implementation considerations of a MSAT packet data network

    Science.gov (United States)

    Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.

    1993-01-01

    The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.

  9. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  10. A Novel Buffer Management Architecture for Epidemic Routing in Delay Tolerant Networks (DTNs)

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2010-01-01

    Delay tolerant networks (DTNs) are wireless networks in which an end-to-end path for a given node pair can never exist for an extended period. It has been reported as a viable approach in launching multiple message replicas in order to increase message delivery ratio and reduce message delivery delay. This advantage, nonetheless, is at the expense of taking more buffer space at each node. The combination of custody and replication entails high buffer and bandwidth overhead. This paper investigates a new buffer management architecture for epidemic routing in DTNs, which helps each node to make a decision on which message should be forwarded or dropped. The proposed buffer management architecture is characterized by a suite of novel functional modules, including Summary Vector Exchange Module (SVEM), Networks State Estimation Module (NSEM), and Utility Calculation Module (UCM). Extensive simulation results show that the proposed buffer management architecture can achieve superb performance against its counterparts in terms of delivery ratio and delivery delay.

  11. A Novel Buffer Management Architecture for Epidemic Routing in Delay Tolerant Networks (DTNs)

    KAUST Repository

    Elwhishi, Ahmed

    2010-11-17

    Delay tolerant networks (DTNs) are wireless networks in which an end-to-end path for a given node pair can never exist for an extended period. It has been reported as a viable approach in launching multiple message replicas in order to increase message delivery ratio and reduce message delivery delay. This advantage, nonetheless, is at the expense of taking more buffer space at each node. The combination of custody and replication entails high buffer and bandwidth overhead. This paper investigates a new buffer management architecture for epidemic routing in DTNs, which helps each node to make a decision on which message should be forwarded or dropped. The proposed buffer management architecture is characterized by a suite of novel functional modules, including Summary Vector Exchange Module (SVEM), Networks State Estimation Module (NSEM), and Utility Calculation Module (UCM). Extensive simulation results show that the proposed buffer management architecture can achieve superb performance against its counterparts in terms of delivery ratio and delivery delay.

  12. Knowledge about fish consumption advisories: a risk communication failure within a university population.

    Science.gov (United States)

    Burger, Joanna; Gochfeld, Michael

    2008-02-15

    Considerable attention has focused on whether people are aware of fish consumption advisories, particularly among fishermen and as a function of demographic variables. Yet little attention has been directed at the messages people are receiving from fish consumption advisories. This study examines knowledge about the benefits and risks of fish in relation to ethnicity and the degree of knowledge in a general university population in New Jersey. Subjects were asked open-ended questions about risks and benefits and responses were grouped into categories. A far greater percent of people had heard something about the risks and benefits of eating fish than could report specific information about the risks or benefits. While only 16% of subjects did not know what the benefits of eating fish were, 62% did not have any specific information about why there were warnings. However, for people who had some specific information, a higher proportion (57%) could identify the chemicals (PCBs, mercury) causing the risks, than could identify omega-3 fatty acids as contributing to benefits (40%). Much of the knowledge was very general, such as eating fish is "good for the heart", "good for you", or "brain food". Less than half of the subjects could name species of fish that were either high or low in contaminants. There were ethnic disparities in knowledge about both the benefits and the risks from fish consumption. A higher percentage of whites knew about both the benefits and risks of fish consumption than others; Asians knew the least about the risks, and blacks and hispanics knew the least about the benefits. There were also ethnic differences in ability to name fish that are low in contaminants, or high in contaminants. Minorities, particularly hispanics, were unable to list species that are high in contaminants. We identified three levels of knowledge about fish consumption: 1) whether people are aware of the risks or benefits of fish consumption, 2) whether they have any

  13. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Directory of Open Access Journals (Sweden)

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  14. An OCP Compliant Network Adapter for GALS-based SoC Design Using the MANGO Network-on-Chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Mahadevan, Shankar; Olsen, Rasmus Grøndahl

    2005-01-01

    decouples communication and computation, providing memory-mapped OCP transactions based on primitive message-passing services of the network. Also, it facilitates GALS-type systems, by adapting to the clockless network. This helps leverage a modular SoC design flow. We evaluate performance and cost of 0...

  15. Message exchange in the building industry

    NARCIS (Netherlands)

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  16. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  17. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  18. Beach Advisory and Closing Online Notification (BEACON) system

    Science.gov (United States)

    Beach Advisory and Closing Online Notification system (BEACON) is a colletion of state and local data reported to EPA about beach closings and advisories. BEACON is the public-facing query of the Program tracking, Beach Advisories, Water quality standards, and Nutrients database (PRAWN) which tracks beach closing and advisory information.

  19. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  20. 76 FR 21877 - Environmental Management Advisory Board

    Science.gov (United States)

    2011-04-19

    ... DEPARTMENT OF ENERGY Environmental Management Advisory Board AGENCY: Department of Energy. ACTION: Notice of call for nominations for appointment to the Environmental Management Advisory Board. SUMMARY... Environmental Management Advisory Board. DATES: Nominations will be accepted through May 13, 2011. ADDRESSES...

  1. 77 FR 19300 - National Infrastructure Advisory Council

    Science.gov (United States)

    2012-03-30

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0012] National Infrastructure Advisory... an open Federal Advisory Committee meeting. SUMMARY: The National Infrastructure Advisory Council... business. For additional information, please consult the NIAC Web site, www.dhs.gov/NIAC , or contact the...

  2. Persian Linguistic and Rhetorical Pathology in The Telegram Communication Network

    Directory of Open Access Journals (Sweden)

    M. Hedayat Mofidi

    2017-12-01

    Full Text Available Today, the mobile phone, with its wide range of features, is an inexpensive, easy to use, and most modern communication tool. One of the special applications of smart phones is providing spaces and facilities such as SMS services, virtual networks, and interactive groups that link people and groups from different linguistic and cultural background. In this paper, we tried to study the messages of the Farsi-speaking users of the Telegram communication network from the linguistics perspective. In this regard, the linguistics and rhetorical correspondence of short messages in Persian language was studied by the content-analysis method. The statistical population consisted of 150 messages which contained 327 sentences. These messages were randomly selected from 5 different groups. Persian language used in cyberspace differs from standard Persian language. The first step in correcting communication language errors in cyberspace is to inform the users about the type of errors.

  3. Designing Skin Cancer Prevention Messages: Should We Emphasize Gains or Losses? Message Framing, Risk Type, and Prior Experience.

    Science.gov (United States)

    Lee, Moon J; Kang, Hannah

    2018-05-01

    To test whether message framing (ie, gain vs. loss) and risk type (ie, health vs appearance risk) in skin cancer prevention messages interact with one's prior experience. Two experiments with a 2 (message framing: gain vs loss) × 2 (risk type: health vs appearance risk) factorial design were conducted. The participants were given a URL to the experiment website via e-mail. On the first page of the website, the participants were told that they would be asked to evaluate a skin cancer print public service announcement (PSA): Online experiments. A total of 397 individuals participated (236 for experiment 1 and 161 for experiment 2). Apparatus: Four versions of the skin cancer print PSAs were developed. Four PSAs were identical except for the 2 manipulated components: message framing and risk type. Measures were adopted from Cho and Boster (message framing), Jones and Leary and Kiene et al. (risk type), De Vries, Mesters, van't Riet, Willems, and Reubsaet and Knight, Kirincich, Farmer, and Hood (prior experience), and Hammond, Fong, Zanna, Thrasher, and Borland and Hoffner and Ye (behavioral intent). General linear models were used to test hypotheses. Three-way interactions among message framing, risk type, and prior experience were found: When the intent of the message was to encourage sunscreen use, the effects of message framing and risk type were shown to be the exact opposite directions from when the intent was to discourage indoor/outdoor tanning. To discourage tanning among those with prior experience, messages emphasizing losses in terms of one's health will work better. For those with no prior experience, messages emphasizing potential appearance losses will work better for discouraging tanning while messages emphasizing gains like improving appearance will do a better job in encouraging sunscreen use.

  4. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  5. Customer Intelligence Analytics on Social Networks

    Directory of Open Access Journals (Sweden)

    Brano MARKIĆ

    2016-08-01

    Full Text Available Discovering needs, habits and consumer behavior is the primary task of marketing analytics. It is necessary to integrate marketing and analytical skills with IT skills. Such knowledge integration allows access to data (structured and unstructured, their analysis and finding out information about the opinions, attitudes, needs and behavior of customers. In the paper is set the hypothesis that software tools can collect data (messages from social networks, analyze the content of messages and get to know the attitudes of customers about a product, service, tourist destination with the ultimate goal of improving customer relations. Experimental results are based on the analysis of the content of social network Facebook by using the package and function R language. This language showed a satisfactory application and development power in analysis of textual data on social networks for marketing analytics.

  6. Hooked on a feeling: Affective anti-smoking messages are more effective than cognitive messages at changing implicit evaluations of smoking

    Directory of Open Access Journals (Sweden)

    Colin Tucker Smith

    2015-10-01

    Full Text Available Because implicit evaluations are thought to underlie many aspects of behavior, researchers have started looking for ways to change them. We examine whether and when persuasive messages alter strongly-held implicit evaluations of smoking. In smokers, an affective anti-smoking message led to more negative implicit evaluations on four different implicit measures as compared to a cognitive anti-smoking message which seemed to backfire. Additional analyses suggested that the observed effects were mediated by the feelings and emotions raised by the messages. In non-smokers, both the affective and cognitive message engendered slightly more negative implicit evaluations. We conclude that persuasive messages change implicit evaluations in a way that depends on properties of the message and of the participant. Thus, our data open new avenues for research directed at tailoring persuasive messages to change implicit evaluations.

  7. Hooked on a feeling: affective anti-smoking messages are more effective than cognitive messages at changing implicit evaluations of smoking.

    Science.gov (United States)

    Smith, Colin Tucker; De Houwer, Jan

    2015-01-01

    Because implicit evaluations are thought to underlie many aspects of behavior, researchers have started looking for ways to change them. We examine whether and when persuasive messages alter strongly held implicit evaluations of smoking. In smokers, an affective anti-smoking message led to more negative implicit evaluations on four different implicit measures as compared to a cognitive anti-smoking message which seemed to backfire. Additional analyses suggested that the observed effects were mediated by the feelings and emotions raised by the messages. In non-smokers, both the affective and cognitive message engendered slightly more negative implicit evaluations. We conclude that persuasive messages change implicit evaluations in a way that depends on properties of the message and of the participant. Thus, our data open new avenues for research directed at tailoring persuasive messages to change implicit evaluations.

  8. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study

    Science.gov (United States)

    Salmon, Charles T

    2018-01-01

    Background In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. Objective The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user’s opinion leadership on the topic of organ donation. Methods All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. Results The findings revealed that personal attributes, professional knowledge, and social positions predicted individual’s local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. Conclusions The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of

  9. Measures for Controlling Spam Messages%垃圾短信控制措施

    Institute of Scientific and Technical Information of China (English)

    乐炯; 陈信刚; 洪亮

    2016-01-01

    With the rapid development of Short Message Service(SMS)value-added services,spam messages repre-sented by advertising messages and fraud messages are increasing,and therefore the mobile phone user's legitimate rights and interests,as the right to tranquility in life,right to communication freedom and right to privacy,etc. are infringed. In order to effectively control the number of spam messages,the paper comprehensively analyzes spam messages types and their transmitting channels. Some control measures of spam messages,as the function of over-clocking intercept,keyword intercept,black list,white list,differentiated quality of services and SMS signature, etc. are deployed in six important network elements of the spam messages transmitting channels,such as SMS cen-ter,SMS gateway,device for mass messages,Service Provider(SP) platform,SP management platform and industry SMS platform. Through the implementation of the measures for controlling spam messages,complaints on spam messages are relatively reduced,and therefore as mobile phone user's experience improves significantly.%随着短信增值业务的快速发展,以广告短信、欺诈短信为代表的垃圾短信日益增加,手机用户的生活安宁权、通信自由权、隐私权等合法权益受到侵害。为有效控制垃圾短信数量,本文对垃圾短信种类及其发送通道进行了全面梳理分析,在短信中心、短信网关、短信群发器、SP平台、SP管理平台、行业短信平台六个垃圾短信发送通道中的重要网元上部署了超频拦截功能、关键字拦截功能、黑名单功能、白名单功能、差异化服务质量保障功能、短信签名功能等垃圾短信控制措施。通过垃圾短信控制措施的实施,垃圾短信投诉量得到较好的控制,手机用户的感知明显提升。

  10. A model for incorporating patient and stakeholder voices in a learning health care network: Washington State's Comparative Effectiveness Research Translation Network.

    Science.gov (United States)

    Devine, Emily Beth; Alfonso-Cristancho, Rafael; Devlin, Allison; Edwards, Todd C; Farrokhi, Ellen T; Kessler, Larry; Lavallee, Danielle C; Patrick, Donald L; Sullivan, Sean D; Tarczy-Hornoch, Peter; Yanez, N David; Flum, David R

    2013-08-01

    To describe the inaugural comparative effectiveness research (CER) cohort study of Washington State's Comparative Effectiveness Research Translation Network (CERTAIN), which compares invasive with noninvasive treatments for peripheral artery disease, and to focus on the patient centeredness of this cohort study by describing it within the context of a newly published conceptual framework for patient-centered outcomes research (PCOR). The peripheral artery disease study was selected because of clinician-identified uncertainty in treatment selection and differences in desired outcomes between patients and clinicians. Patient centeredness is achieved through the "Patient Voices Project," a CERTAIN initiative through which patient-reported outcome (PRO) instruments are administered for research and clinical purposes, and a study-specific patient advisory group where patients are meaningfully engaged throughout the life cycle of the study. A clinician-led research advisory panel follows in parallel. Primary outcomes are PRO instruments that measure function, health-related quality of life, and symptoms, the latter developed with input from the patients. Input from the patient advisory group led to revised retention procedures, which now focus on short-term (3-6 months) follow-up. The research advisory panel is piloting a point-of-care, patient assessment checklist, thereby returning study results to practice. The cohort study is aligned with the tenets of one of the new conceptual frameworks for conducting PCOR. The CERTAIN's inaugural cohort study may serve as a useful model for conducting PCOR and creating a learning health care network. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  12. Implications of advanced warning messages on eliminating sun glare disturbances at signalized intersections

    Directory of Open Access Journals (Sweden)

    Qing Li

    2016-08-01

    Full Text Available Due to sun glare disturbances, drivers encounter fatal threats on roadways, particularly at signalized intersections. Many studies have attempted to develop applicable solutions, such as avoiding sun positions, applying road geometric re-directions, and wearing anti-glare glasses. None of these strategies have fully solved the problem. As one of the “Connected Vehicle” practices proposed by the U.S. Department of Transportation, advanced warning messages (AWMs are capable of providing wireless information about traffic controls. AWM acts as a supplement to conventional signs and signals, which can be blocked by obstacles or natural disturbances, such as sun glare. The drivers' smart advisory system (DSAS can provide drivers with AWM. Using a driving simulator this research explores the effects of DSAS messages on driving behaviors under sun glare disturbance. Statistical analyses were applied to assess (1 the negative impacts of sun glare, (2 the compensation of the DSAS AWM to sun glare effects, and (3 the improvement in driving performance due to DSAS AWM. Four performance indexes were measured, including (1 half kinetic energy speed, (2 mean approach speed, (3 brake response time, and (4 braking distance. The effects of the socio-demographic factors, such as gender, age, educational background, and driving experience were also studied. The analytical results illustrate that the DSAS can compensate for reduced visibility due to sun glare and improve driving performance to a normal visual situation, particularly for left turn and through movement.

  13. The religious message in action - a case study

    Directory of Open Access Journals (Sweden)

    René Gothóni

    1975-01-01

    Full Text Available We understand a religious message to be the product of a religious movement. In studying such a message, it is very much to the purpose to place it in the context in which it operates. The cultural and social context of a religious message is some religious movement. Hence, the message should be examined against that framework. Each message has a certain structure, and its detection is of prime importance. Messages are not only part of the tradition, but themselves unique in their respective communicative situations. Thus, in our view, structural analysis does not have analytical use-value unless the message's symbols are set into their communicative context. The aim of this paper is dual: On the one hand, we intend to analyze and clarify the structure of a religious message of the Laestadian movement, how the message operates, also how the members of that movement respond to the codes of the message, and what kind of functions it fulfills; on the other, to develop and test an analytical model which would combine structural and interactional analysis.

  14. 77 FR 12841 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2012-03-02

    ... for the implementation of best business practices to improve Federal Government management and... performance management, Senior Executive Service (SES) leadership development and SES performance appraisal... President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY...

  15. 78 FR 40487 - National Infrastructure Advisory Council

    Science.gov (United States)

    2013-07-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0033] National Infrastructure Advisory... an open Federal Advisory Committee Meeting. SUMMARY: The National Infrastructure Advisory Council..., from 1:30 p.m. to 4:30 p.m. The meeting may close early if the committee has completed its business...

  16. Nuclear Structure and Decay Data (NSDD) network

    International Nuclear Information System (INIS)

    Pronyaev, V.G.

    2001-02-01

    This report provides a brief description of the Nuclear Structure and Decay Data (NSDD) Network in response to a request from the Advisory Group Meeting on ''Co-ordination of the International Network of Nuclear Structure and Decay Data Evaluators'' (IAEA, Vienna, 14-17 December 1998, report IAEA(NDS)-399 (1999)). This report supersedes the special issue of the Nuclear Data Newsletter No. 20 published in November 1994. (author)

  17. Multiple-Ring Digital Communication Network

    Science.gov (United States)

    Kirkham, Harold

    1992-01-01

    Optical-fiber digital communication network to support data-acquisition and control functions of electric-power-distribution networks. Optical-fiber links of communication network follow power-distribution routes. Since fiber crosses open power switches, communication network includes multiple interconnected loops with occasional spurs. At each intersection node is needed. Nodes of communication network include power-distribution substations and power-controlling units. In addition to serving data acquisition and control functions, each node acts as repeater, passing on messages to next node(s). Multiple-ring communication network operates on new AbNET protocol and features fiber-optic communication.

  18. 77 FR 38065 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2012-06-26

    ... for the implementation of best business practices to improve Federal Government management and... management, IT vendor performance management, Senior Executive Service (SES) leadership development and SES... President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY...

  19. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing

    NARCIS (Netherlands)

    Riet, J.P. van 't; Cox, A.D.; Cox, D.; Zimet, G.D.; Bruijn, G.J. de; Putte, B. van den; Vries, H. de; Werrij, M.Q.; Ruiter, R.A.C.

    2016-01-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour

  20. Advisory Board on Alcoholism and Drug Abuse

    Science.gov (United States)

    State Employees Advisory Board on Alcoholism and Drug Abuse DHSS State of Alaska Home Divisions and ; Advisory Board on Alcoholism and Drug Abuse Page Content Alison Kulas Executive Director If you, a family Kulas Begins Tenure as Executive Director The Advisory Board on Alcoholism and Drug Abuse, The Alaska

  1. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  2. 76 FR 64122 - NASA Advisory Committee; Renewal of NASA's International Space Station Advisory Committee Charter

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-095)] NASA Advisory Committee; Renewal of NASA's International Space Station Advisory Committee Charter AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of renewal and amendment of the Charter of the International...

  3. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  4. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  5. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2013-01-01

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  6. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  7. Women receiving news of a family BRCA1/2 mutation: messages of fear and empowerment.

    Science.gov (United States)

    Crotser, Cheryl B; Dickerson, Suzanne S

    2010-12-01

    Communication of genetic test results to healthy at-risk family members is complicated considering family dynamics and the complexity of cancer genetics. The purpose of this study was to understand the experience of family communication of BRCA1/2 results from the perspective of young and middle-aged women receiving the news. THEORETICAL RATIONALE: Individuals are self-interpretive beings influenced by family culture, history, and communication patterns. Humans express meaning through language and stories. Heideggerian hermeneutics guided in-depth interviews and team interpretation of data. Using purposive and network sampling, 19 women 18 to 50 years of age who received news of a family BRCA1/2 mutation from a biologic relative were recruited from support groups and two health facilities in upstate New York. Five themes emerged: (a) situating the story, (b) receiving the message from family, (c) responding to receipt of the message, (d) impacting family communication, and (e) advice for communicating risk. Two constitutive patterns were identified: (a) communicating risk as a message of fear and empowerment and (b) integrating the message by taking one step at a time. Healthcare professionals (HCPs) have an important role in provision of anticipatory guidance for communication of genetic test results, including the potential behavioral and emotional responses to family risk communication. Future research is indicated to understand the role of HCPs in family risk communication. Presentation of comprehensive and balanced information and the use of patient-centered communication is essential. HCPs need to view women as whole rather than as a person at risk. Continued support is needed for women who subsequently test positive or negative for the family BRCA1/2 mutation from HCPs and others, often outside the family network. © 2010 Sigma Theta Tau International.

  8. 77 FR 2700 - National Advisory Council on Minority Business Enterprise: Meeting of the National Advisory...

    Science.gov (United States)

    2012-01-19

    ... Business Enterprise: Meeting of the National Advisory Council on Minority Business Enterprise AGENCY.... SUMMARY: The National Advisory Council for Minority Business Enterprise (NACMBE) will hold its fifth... deliberate on possible recommendations. The Subcommittee topics include: (1) Definition of Minority Business...

  9. Hand hygiene posters: motivators or mixed messages?

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  10. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  11. Mentalizing and Microblog Repost through Social Network: Evidence from a Resting-state-fMRI study

    Directory of Open Access Journals (Sweden)

    Huijun Zhang

    2016-11-01

    Full Text Available Microblogs is one of the main social networking channels by which information is spread. Among them, Sina Weibo is one of the largest social networking channel in China. Millions of users repost information from Sina Weibo and share embedded emotion at the same time. The present study investigated participants’ propensity to repost microblog messages of positive, negative or neutral valence, and studied the neural correlates during resting state with the reposting rate of each type microblog messages. Participants preferred to repost negative messages relative to positive and neutral messages. Reposting rate of negative messages was positively correlated to the functional connectivity of temporoparietal junction (TPJ with insula, and TPJ with dorsolateral prefrontal cortex (DLPFC. These results indicate that reposting negative messages is related to conflict resolution between the feeling of pain/ disgust and the intention to repost significant information. Thus, resposting emotional microblog messages might be attributed to participants’ appraisal of personal and recipient’s interest, as well as their cognitive process for decision making.

  12. An evaluation of current high-performance networks

    Energy Technology Data Exchange (ETDEWEB)

    Bell, Christian; Bonachea, Dan; Cote, Yannick; Duell, Jason; Hargrove, Paul; Husbands, Parry; Iancu, Costin; Welcome, Michael; Yelick, Katherine

    2003-01-25

    High-end supercomputers are increasingly built out of commodity components, and lack tight integration between the processor and network. This often results in inefficiencies in the communication subsystem, such as high software overheads and/or message latencies. In this paper we use a set of microbenchmarks to quantify the cost of this commoditization, measuring software overhead, latency, and bandwidth on five contemporary supercomputing networks. We compare the performance of the ubiquitous MPI layer to that of lower-level communication layers, and quantify the advantages of the latter for small message performance. We also provide data on the potential for various communication-related optimizations, such as overlapping communication with computation or other communication. Finally, we determine the minimum size needed for a message to be considered 'large' (i.e., bandwidth-bound) on these platforms, and provide historical data on the software overheads of a number of supercomputers over the past decade.

  13. Using minimal spanning trees to compare the reliability of network topologies

    Science.gov (United States)

    Leister, Karen J.; White, Allan L.; Hayhurst, Kelly J.

    1990-01-01

    Graph theoretic methods are applied to compute the reliability for several types of networks of moderate size. The graph theory methods used are minimal spanning trees for networks with bi-directional links and the related concept of strongly connected directed graphs for networks with uni-directional links. A comparison is conducted of ring networks and braided networks. The case is covered where just the links fail and the case where both links and nodes fail. Two different failure modes for the links are considered. For one failure mode, the link no longer carries messages. For the other failure mode, the link delivers incorrect messages. There is a description and comparison of link-redundancy versus path-redundancy as methods to achieve reliability. All the computations are carried out by means of a fault tree program.

  14. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  15. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  16. 42 CFR 90.9 - Public health advisory.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Public health advisory. 90.9 Section 90.9 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH... PROCEDURES § 90.9 Public health advisory. ATSDR may issue a public health advisory based on the findings of a...

  17. The Advisory Committee of International Nuclear Information System (INIS) for Japan

    International Nuclear Information System (INIS)

    Kunii, Katsuhiko; Itabashi, Keizo

    2016-10-01

    Under the International Atomic Energy Agency (IAEA), the International Nuclear Information System (INIS) Programme commenced in 1970 and ever since INIS has been acting as a database system available worldwide through information networks each time providing bibliographic information then full text documents of literature, technical reports, etc. on peaceful use of nuclear science and technology, thoroughly supported and maintained by INIS Secretariat in Vienna, on the other hand the inputs for INIS are provided by Member States and Organizations in their own boundaries. As for the INIS activity in Japan, while, the Japan Atomic Energy Research Institute (JAERI), then succeeded as the Japan Atomic Energy Agency (JAEA) as of today, the both have been responsible with the INIS activity in Japan as the INIS National Centre for Japan based on the request of the “former” Science and Technology Agency of the Japanese Government, an advisory committee had have a very important role for the INIS activity in Japan by enthusiastically advising the whole related to the activity from advanced and comprehensive viewpoints of expertise. This report describes about it, the Advisory Committee of International Nuclear Information System (INIS) for Japan, successfully been held 34 times from Oct. 1970 to Mar. 2005. Included are the history and its records, change of the member and topics of the Advisory Committee, and the minutes. (author)

  18. 76 FR 62455 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2011-10-07

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-088)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel... Burch, Aerospace Safety Advisory Panel Administrative Officer, National Aeronautics and Space...

  19. 78 FR 1265 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2013-01-08

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-001] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel..., Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space Administration...

  20. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  1. Cacades: A reliable dissemination protocol for data collection sensor network

    Science.gov (United States)

    Peng, Y.; Song, W.; Huang, R.; Xu, M.; Shirazi, B.; LaHusen, R.; Pei, G.

    2009-01-01

    In this paper, we propose a fast and reliable data dissemination protocol Cascades to disseminate data from the sink(base station) to all or a subset of nodes in a data collection sensor network. Cascades makes use of the parentmonitor-children analogy to ensure reliable dissemination. Each node monitors whether or not its children have received the broadcast messages through snooping children's rebroadcasts or waiting for explicit ACKs. If a node detects a gap in its message sequences, it can fetch the missing messages from its neighbours reactively. Cascades also considers many practical issues for field deployment, such as dynamic topology, link/node failure, etc.. It therefore guarantees that a disseminated message from the sink will reach all intended receivers and the dissemination is terminated in a short time period. Notice that, all existing dissemination protocols either do not guarantee reliability or do not terminate [1, 2], which does not meet the requirement of real-time command control. We conducted experiment evaluations in both TOSSIM simulator and a sensor network testbed to compare Cascades with those existing dissemination protocols in TinyOS sensor networks, which show that Cascades achieves a higher degree of reliability, lower communication cost, and less delivery delay. ??2009 IEEE.

  2. 76 FR 19147 - Aerospace Safety Advisory Panel; Meeting.

    Science.gov (United States)

    2011-04-06

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-030)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel.... Kathy Dakon, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  3. 78 FR 56941 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2013-09-16

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: 13-114] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  4. 77 FR 25502 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2012-04-30

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (12-030)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel... FURTHER INFORMATION CONTACT: Ms. Harmony Myers, Aerospace Safety Advisory Panel Executive Director...

  5. 77 FR 38090 - Aerospace Safety Advisory Panel; Meeting.

    Science.gov (United States)

    2012-06-26

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-044] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  6. 75 FR 61219 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2010-10-04

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-116)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel... Dakon, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space Administration...

  7. 77 FR 58413 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2012-09-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-074] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  8. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages.

    Science.gov (United States)

    Moorman, Marjolein; van den Putte, Bas

    2008-10-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two separate waves from current cigarette smokers with varying levels of nicotine dependence (N=151). In the second wave, participants were randomly assigned to one of two groups. In the first group, participants read a smoking cessation message which emphasized the benefits of quitting (positive frame). In the second group participants read a message which emphasized the costs of not quitting (negative frame). Results show that smokers' intentions to quit smoking and their level of nicotine dependence jointly influence the persuasiveness of positive and negative message frames. When nicotine dependence and quitting intention are both high, a negative frame works best. Conversely, a positive frame is preferable when nicotine dependence or quitting intention is low. Smokers' level of processing is proposed as the underlying mechanism explaining the different effects of message frames.

  9. 76 FR 64348 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2011-10-18

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  10. 77 FR 57085 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2012-09-17

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  11. 77 FR 6113 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2012-02-07

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  12. 78 FR 21354 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2013-04-10

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  13. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  14. A framework for unsupervised spam detection in social networking sites

    NARCIS (Netherlands)

    Bosma, M.; Meij, E.; Weerkamp, W.

    2012-01-01

    Social networking sites offer users the option to submit user spam reports for a given message, indicating this message is inappropriate. In this paper we present a framework that uses these user spam reports for spam detection. The framework is based on the HITS web link analysis framework and is

  15. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    NARCIS (Netherlands)

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions

  16. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Science.gov (United States)

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  17. Empowerment in the process of health messaging for rural low-income mothers: an exploratory message design project.

    Science.gov (United States)

    Aldoory, Linda; Braun, Bonnie; Maring, Elisabeth Fost; Duggal, Mili; Briones, Rowena Lynn

    2015-01-01

    Rural, low-income mothers face challenges to their health equal to or greater than those of low-income mothers from urban areas. This study put health message design into the hands of low-income rural mothers. The current study filled a research gap by analyzing a participatory process used to design health messages tailored to the everyday lives of rural low-income mothers. A total of forty-three mothers participated in nine focus groups, which were held from 2012 to 2013, in eight states. The mothers were from different racial and ethnic backgrounds. Participants discussed food security, physical activity, and oral health information. They created messages by considering several elements: visuals, length of message, voice/perspective, self-efficacy and personal control, emotional appeals, positive and negative reinforcements, and steps to health behavior change. This study was innovative in its focus on empowerment as a key process to health message design.

  18. 75 FR 6407 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2010-02-09

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10- 020)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel... FURTHER INFORMATION CONTACT: Ms. Kathy Dakon, Aerospace Safety Advisory Panel Executive Director, National...

  19. 75 FR 14135 - U.S. Travel And Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-03-24

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel And Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S. Department of Commerce. ACTION: Notice of an open meeting. SUMMARY: The U.S. Travel and Tourism Advisory...

  20. 75 FR 16438 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-04-01

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... Tourism Advisory Board (Board) will hold a meeting to discuss topics related to the travel and tourism...

  1. 75 FR 39496 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-07-09

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S. Department of Commerce. ACTION: Notice of an open meeting. SUMMARY: The U.S. Travel and Tourism Advisory...

  2. 77 FR 56242 - Dodd-Frank Investor Advisory Committee

    Science.gov (United States)

    2012-09-12

    ... Investor Advisory Committee AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the Dodd-Frank Wall...

  3. 78 FR 43254 - Dodd-Frank Investor Advisory Committee

    Science.gov (United States)

    2013-07-19

    ... Investor Advisory Committee AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the Dodd-Frank Wall...

  4. 78 FR 20156 - Dodd-Frank Investor Advisory Committee

    Science.gov (United States)

    2013-04-03

    ... Investor Advisory Committee AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the Dodd-Frank Wall...

  5. 78 FR 2706 - Dodd-Frank Investor Advisory Committee

    Science.gov (United States)

    2013-01-14

    ... Investor Advisory Committee AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the Dodd-Frank Wall...

  6. 78 FR 36793 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2013-06-19

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-068] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel..., Huntsville, AL 35805 FOR FURTHER INFORMATION CONTACT: Ms. Harmony Myers, Aerospace Safety Advisory Panel...

  7. 76 FR 40726 - Notification of Public Teleconferences of the Science Advisory Board Radiation Advisory Committee...

    Science.gov (United States)

    2011-07-11

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9435-3] Notification of Public Teleconferences of the Science... Protection Agency (EPA), Science Advisory Board Staff Office. ACTION: Notice. SUMMARY: The EPA Science... information concerning the EPA Science Advisory Board can be found at the EPA SAB Web site at http// www.epa...

  8. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing.

    Science.gov (United States)

    Van 't Riet, Jonathan; Cox, Anthony D; Cox, Dena; Zimet, Gregory D; De Bruijn, Gert-Jan; Van den Putte, Bas; De Vries, Hein; Werrij, Marieke Q; Ruiter, Robert A C

    2016-12-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour determines the relative persuasiveness of gain- and loss-framed messages. This 'risk-framing hypothesis', which was derived from prospect theory, has been central to health message-framing research for the better part of two decades and has enduring appeal to researchers and practitioners. It has found its way into several health communication handbooks and is communicated to the general public. The present article examines the validity of the risk-framing hypothesis anew by providing a review of the health message-framing literature. In spite of its ongoing appeal, we conclude that the hypothesis has severe theoretical flaws. In addition, we find that the empirical evidence in favour of the hypothesis is weak and inconsistent. It seems that, in applying prospect theory's tenets to a health-promotion context, some of the theory's key aspects have been lost in translation. At the close of the article, we offer a research agenda for the future, arguing that, above all, new methodology is needed to bring the message-framing literature further.

  9. Emotion homophily in social network site messages

    OpenAIRE

    Thelwall, Mike

    2010-01-01

    Social network sites (SNS) like MySpace seem to play a role in friendships and wider relationships for many people. Emotion expression can be important in relationship maintenance but little is known about the role of emotion in SNSs, other than positive comments being widespread in MySpace. But is emotion typically reciprocated, and do Friends express and/or receive similar levels of emotion expression to each other? Based upon an analysis of over two million MySpace public comments associat...

  10. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  11. Mass media influence spreading in social networks with community structure

    Science.gov (United States)

    Candia, Julián; Mazzitello, Karina I.

    2008-07-01

    We study an extension of Axelrod's model for social influence, in which cultural drift is represented as random perturbations, while mass media are introduced by means of an external field. In this scenario, we investigate how the modular structure of social networks affects the propagation of mass media messages across a society. The community structure of social networks is represented by coupled random networks, in which two random graphs are connected by intercommunity links. Considering inhomogeneous mass media fields, we study the conditions for successful message spreading and find a novel phase diagram in the multidimensional parameter space. These findings show that social modularity effects are of paramount importance for designing successful, cost-effective advertising campaigns.

  12. 76 FR 5160 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). ADDRESSES: A copy of...

  13. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  14. Topicality and impact in social media: diverse messages, focused messengers.

    Science.gov (United States)

    Weng, Lilian; Menczer, Filippo

    2015-01-01

    We have a limited understanding of the factors that make people influential and topics popular in social media. Are users who comment on a variety of matters more likely to achieve high influence than those who stay focused? Do general subjects tend to be more popular than specific ones? Questions like these demand a way to detect the topics hidden behind messages associated with an individual or a keyword, and a gauge of similarity among these topics. Here we develop such an approach to identify clusters of similar hashtags in Twitter by detecting communities in the hashtag co-occurrence network. Then the topical diversity of a user's interests is quantified by the entropy of her hashtags across different topic clusters. A similar measure is applied to hashtags, based on co-occurring tags. We find that high topical diversity of early adopters or co-occurring tags implies high future popularity of hashtags. In contrast, low diversity helps an individual accumulate social influence. In short, diverse messages and focused messengers are more likely to gain impact.

  15. 75 FR 80039 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-12-21

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  16. 76 FR 21703 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2011-04-18

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  17. 76 FR 53666 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2011-08-29

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  18. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages

    NARCIS (Netherlands)

    Moorman, M.; van den Putte, B.

    2008-01-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two

  19. 77 FR 29705 - Dodd-Frank Investor Advisory Committee

    Science.gov (United States)

    2012-05-18

    ... Investor Advisory Committee AGENCY: Securities and Exchange Commission. ACTION: Notice of First Meeting of Securities and Exchange Commission Dodd-Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the Dodd-Frank Wall...

  20. 78 FR 15937 - Fusion Energy Sciences Advisory Committee

    Science.gov (United States)

    2013-03-13

    ... DEPARTMENT OF ENERGY Fusion Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Fusion Energy Sciences Advisory Committee. The Federal Advisory Committee Act requires that public notice of...

  1. 77 FR 5246 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2012-02-02

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Office of Science... of the Basic Energy Sciences Advisory Committee (BESAC). The Federal Advisory Committee Act (Pub. L... FURTHER INFORMATION CONTACT: Katie Perine; Office of Basic Energy Sciences; U.S. Department of Energy...

  2. 78 FR 2259 - Fusion Energy Sciences Advisory Committee

    Science.gov (United States)

    2013-01-10

    ... DEPARTMENT OF ENERGY Fusion Energy Sciences Advisory Committee AGENCY: Office of Science... Energy Sciences Advisory Committee. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770... Energy Sciences; U.S. Department of Energy; 1000 Independence Avenue SW.; Washington, DC 20585-1290...

  3. 77 FR 70807 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2012-11-27

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  4. 76 FR 40929 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2011-07-12

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  5. 77 FR 47873 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2012-08-10

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  6. 75 FR 50780 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2010-08-17

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  7. Improving Type Error Messages in OCaml

    Directory of Open Access Journals (Sweden)

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  8. 75 FR 70004 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2010-11-16

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Thursday, December 2, 2010 at...

  9. 75 FR 60458 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2010-09-30

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Thursday, October 14, 2010 at...

  10. 75 FR 53694 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2010-09-01

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Tuesday, September 21, 2010 at...

  11. Information and Communications Technologies (ICT): Problematic use of Internet, video games, mobile phones, instant messaging and social networks using MULTICAGE-TIC.

    Science.gov (United States)

    Pedrero Pérez, Eduardo J; Ruiz Sánchez de León, José María; Rojo Mota, Gloria; Llanero Luque, Marcos; Pedrero Aguilar, Jara; Morales Alonso, Sara; Puerta García, Carmen

    2018-01-01

    Use/abuse of Information and Communications Technologies (ICT) has in recent years become a topic of great interest. Current discussion addresses whether it must be considered addictive behaviour and if it is a problem that primarily affects adolescents and youth. This study aims to understand the problems that affect people of all ages in controlling the use of these ICTs and whether they are related to mental health problems, stress and difficulties in executive control of behaviour. A survey was administered through social networks and email, using the MULTICAGE-ICT, a questionnaire that explores problems in the use of Internet, mobile phones, video games, instant messaging and social networks. Additionally, the Prefrontal Symptom Inventory, General Health Questionnaire and Perceived Stress Scale were administered. The sample was comprised of 1,276 individuals of all ages from different Spanish-speaking countries. The results indicate that about 50% of the sample, regardless of age or other variables, presents significant problems with the use of these technologies, and that these problems are directly related to symptoms of poor prefrontal functioning, stress and mental health problems. The results reveal the need for reconsidering whether we are facing an addictive behaviour or a new problem demanding environmental, psychological, sociological and sociopolitical explanations; therefore, it is necessary to reformulate actions to be implemented to address and refocus our understanding of the problem.

  12. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  13. 76 FR 48147 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2011-08-08

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of renewal of the Basic Energy Sciences Advisory Committee. SUMMARY... that the Basic Energy Sciences Advisory Committee will be renewed for a two-year period beginning July...

  14. 75 FR 6369 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2010-02-09

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of Open Meeting. SUMMARY: This notice announces a meeting of the Basic Energy Sciences Advisory Committee (BESAC). Federal Advisory Committee Act (Pub. L. 92- 463, 86 Stat. 770...

  15. 75 FR 8685 - Fusion Energy Sciences Advisory Committee

    Science.gov (United States)

    2010-02-25

    ... DEPARTMENT OF ENERGY Fusion Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Fusion Energy Sciences Advisory Committee. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770...

  16. 76 FR 41234 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2011-07-13

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Basic Energy Sciences Advisory Committee (BESAC). Federal Advisory Committee Act (Pub. L. 92- 463, 86 Stat. 770...

  17. 78 FR 38696 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2013-06-27

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of Open Meeting. SUMMARY: This notice announces a meeting of the Basic Energy Sciences Advisory Committee (BESAC). The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat...

  18. 78 FR 6088 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Office of Science... Energy Sciences Advisory Committee (BESAC). The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat... INFORMATION CONTACT: Katie Perine, Office of Basic Energy Sciences, U.S. Department of Energy; SC-22...

  19. 77 FR 41395 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2012-07-13

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Basic Energy Sciences Advisory Committee (BESAC). Federal Advisory Committee Act (Pub. L. 92- 463, 86 Stat. 770...

  20. 76 FR 8358 - Basic Energy Sciences Advisory Committee

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF ENERGY Basic Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Basic Energy Sciences Advisory Committee (BESAC). Federal Advisory Committee Act (Pub. L. 92- 463, 86 Stat. 770...

  1. 76 FR 40714 - Fusion Energy Sciences Advisory Committee

    Science.gov (United States)

    2011-07-11

    ... DEPARTMENT OF ENERGY Fusion Energy Sciences Advisory Committee AGENCY: Department of Energy, Office of Science. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Fusion Energy Sciences Advisory Committee. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770...

  2. 77 FR 16062 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2012-03-19

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... Individuals with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  3. 77 FR 28897 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2012-05-16

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... Individuals with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  4. 76 FR 17965 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2011-03-31

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... Individuals with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  5. 75 FR 82410 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2010-12-30

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... (BIE) is announcing that the Advisory Board for Exceptional Children (Advisory Board) will hold its... Individuals with Disabilities Education Act of 2004 (IDEA) for Indian children with disabilities. DATES: The...

  6. 75 FR 53334 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2010-08-31

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY: Bureau of Indian Affairs, Interior. ACTION: Notice of meeting; correction. SUMMARY: The Bureau of Indian... Advisory Board for Exceptional Children (Advisory Board) will hold its next meeting in Washington, DC. The...

  7. An Inter-Networking Mechanism with Stepwise Synchronization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Masayuki Murata

    2011-08-01

    Full Text Available To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  8. 75 FR 20844 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2010-04-21

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Tuesday, June 15, 2010 at 2:00...

  9. 75 FR 6031 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2010-02-05

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Wednesday, March 24, 2010 at 2...

  10. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  11. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  12. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study.

    Science.gov (United States)

    Shi, Jingyuan; Salmon, Charles T

    2018-01-09

    In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user's opinion leadership on the topic of organ donation. All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. The findings revealed that personal attributes, professional knowledge, and social positions predicted individual's local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of influence on their direct connections could also effectively

  13. 77 FR 42298 - Biomass Research and Development Technical Advisory Committee

    Science.gov (United States)

    2012-07-18

    ... Biomass Research and Development Technical Advisory Committee (Technical Advisory Committee). DATES: The... 9008(d) established the Biomass Research and Development Technical Advisory Committee and lays forth... nomination. Appointments to the Biomass Research and Development Technical Advisory Committee will be made by...

  14. 75 FR 73166 - Art Advisory Panel-Closed Meeting

    Science.gov (United States)

    2010-11-29

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service Art Advisory Panel--Closed Meeting AGENCY: Internal Revenue Service, Treasury. ACTION: Notice of Closed Meeting of Art Advisory Panel for Decorative Art. SUMMARY: A closed meeting of the Art Advisory Panel will be held in Washington, DC. DATES: The...

  15. 78 FR 42105 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2013-07-15

    ....97C22214.001] Advisory Board for Exceptional Children AGENCY: Bureau of Indian Affairs, Interior. ACTION... for Exceptional Children (Advisory Board) will hold its next meeting in Albuquerque, New Mexico. The... (IDEA) for Indian children with disabilities. DATES: The Advisory Board will meet on Thursday, July 18...

  16. CORPORATE SOCIAL NETWORKS IN EDUCATION: EXPERIENCE OF USE

    Directory of Open Access Journals (Sweden)

    Lytvynova S.

    2017-12-01

    Full Text Available The paper discusses methods, forms and safety issues of social network usage for school students. Taking into consideration the growing interest of students to electronic communication in social networks (ESN, their place in the information educational environment is described. The classification of objects and use of ESNs was made to help teachers and school authority to teach students in the corporate social network. The basic components of corporate social networks (СESN were revealed: forms of learning activity (individual, group, and collective, forms of learning organization (quiz, debates, discussions, photo-story, essay contest, a virtual tour, mini design web quest, and conference video-lesson, and database. Particular aspects of the use of certain forms for students training in ESN aсcording to the type of social objects (messages, individual messages, video files, photos, audio files, documents, comments, and blitz-survey were defined. Student safety when using ESN and СESN impact on a student social and cultural intelligence development are discussed as well.

  17. Toward a Seamless Society: Networking in Education.

    Science.gov (United States)

    Ambron, Sueann, Ed.

    1988-01-01

    This collection of papers includes both presentations at a two-day conference of the Education Advisory Council at Apple Computer which considered information and insights on the use of telecommunications and networking in education, and papers describing other telecommunications projects that have been identified since the council's meeting.…

  18. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  19. Visualizing Public Opinion in Croatia Based on Available Social Network Content

    Directory of Open Access Journals (Sweden)

    Ševa, Jurica

    2016-01-01

    Full Text Available In the last decade advances of computer technologies have lead towards a technological reality where the line between information consumers and information producers is blurred. This technological omnipresence allows for unprecedented data creation capabilities. Based on various data sources, it seems humans have fully embraced data-generating activities. One such activity is using online social network applications, like Facebook or Twitter in almost all aspects of their lives. One of the main features of online social network applications is perceived freedom of speech, individuality and privacy, even though every application has some special features. Therefore, content generated using these services presents the public with interesting insights in private life of people and their attitudes towards public affairs. Social network applications are active the most during specific public events aimed at the massive public. Due to its brevity, ease of use and frequency, Twitter is an interesting social network application for research and analysis. Other than allowing almost exclusively short messages (up to 140 characters, a tweet (a Twitter post can contain location of the message sender as well as a graphic to accompany the textual message. The textual part of the message may contain so called hashtags – keywords used for indexing and easy identification of a subject the message is related to. These hashtags allow us to group messages related to a specific event. Recent governmental elections held in Croatia were very popular amongst the Croatian Twitter community. Usage of hashtags allowed us to identify the right messages and thus most-used words to describe this event and potentially identify how people felt when talking, i.e. writing, about politics and the held elections. Furthermore, geolocation information, optionally embedded in a tweet, makes it possible to analyze which keywords were used in which parts of Croatia, all pertaining to

  20. 75 FR 63450 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2010-10-15

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86... 20852. FOR FURTHER INFORMATION CONTACT: John Kogut, Executive Secretary; High Energy Physics Advisory...

  1. SNAPS : semantic network traffic analysis through projection and selection

    NARCIS (Netherlands)

    Cappers, B.C.M.; van Wijk, J.J.; Harrison, L.; Prigent, N.; Engle, S.; Best, D.; Goodall, J.

    2015-01-01

    Most network traffic analysis applications are designed to discover malicious activity by only relying on high-level flow-based message properties. However, to detect security breaches that are specifically designed to target one network (e.g., Advanced Persistent Threats), deep packet inspection

  2. Program For Local-Area-Network Electronic Mail

    Science.gov (United States)

    Weiner, Michael J.

    1989-01-01

    MailRoom is computer program for local-area network (LAN) electronic mail. Enables users of LAN to exchange electronically notes, letters, reminders, or any sort of communication via their computers. Links all users of LAN into communication circle in which messages created, sent, copied, printed, downloaded, uploaded, and deleted through series of menu-driven screens. Includes feature that enables users to determine whether messages sent have been read by receivers. Written in Microsoft QuickBasic.

  3. 78 FR 14299 - Notification of a Public Meeting of the Science Advisory Board Chemical Assessment Advisory...

    Science.gov (United States)

    2013-03-05

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9786-6] Notification of a Public Meeting of the Science...: Notice. SUMMARY: The Environmental Protection Agency (EPA or agency) Science Advisory Board (SAB) Staff Office announces a public meeting of the SAB Chemical Assessment Advisory Committee (CAAC) to receive a...

  4. 75 FR 23288 - Advisory Board for Exceptional Children

    Science.gov (United States)

    2010-05-03

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Advisory Board for Exceptional Children AGENCY... Exceptional Children (Advisory Board) will hold its next meeting in Old Town, Maine. The purpose of the... Indian children with disabilities. DATES: The Advisory Board will meet on Monday, May 17, 2010, from 8:30...

  5. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  6. Using Text-Messaging in the Secondary Classroom

    Science.gov (United States)

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  7. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  8. Matching Message Design and Depressed Cognition: An Exploration of Attention Patterns for Gain- and Loss-Framed Depression Help-Seeking Messages.

    Science.gov (United States)

    Lueck, Jennifer A

    2017-07-01

    Although disproportionally affected by depression, most depressed college students do not seek the help they need. Research has recently uncovered the potential negative effects of depression help-seeking messages if depressed cognition is not considered in the health message design process. It is unclear if depression determines whether and how individuals pay attention to gain- and loss-framed depression help-seeking messages-a mechanism that has significant implications for the strategic planning of health communication interventions. In order to enable the effective matching of message design and audience features, this study investigated attention patterns for gain (n = 75)- and loss (n = 78)-framed depression help-seeking messages using eye-tracking technology and self-report measures. The results confirmed that depression is a characteristic of risk avoidance and negative cognition. Depressed participants tended to pay more attention to disease information that was placed in a loss-framed rather than a gain-framed depression help-seeking message. Using negative message framing strategies for health messages seeking to educate about depression symptoms might therefore be a useful persuasive strategy-particularly when disseminated to vulnerable populations affected by depression. Furthermore, the present study emphasizes the effective use of eye-tracking technology in communication research.

  9. Effects of argument quality, source credibility and self-reported diabetes knowledge on message attitudes: an experiment using diabetes related messages.

    Science.gov (United States)

    Lin, Tung-Cheng; Hwang, Lih-Lian; Lai, Yung-Jye

    2017-05-17

    Previous studies have reported that credibility and content (argument quality) are the most critical factors affecting the quality of health information and its acceptance and use; however, this causal relationship merits further investigation in the context of health education. Moreover, message recipients' prior knowledge may moderate these relationships. This study used the elaboration likelihood model to determine the main effects of argument quality, source credibility and the moderating effect of self-reported diabetes knowledge on message attitudes. A between-subjects experimental design using an educational message concerning diabetes for manipulation was applied to validate the effects empirically. A total of 181 participants without diabetes were recruited from the Department of Health, Taipei City Government. Four group messages were manipulated in terms of argument quality (high and low) × source credibility (high and low). Argument quality and source credibility of health information significantly influenced the attitude of message recipients. The participants with high self-reported knowledge participants exhibited significant disapproval for messages with low argument quality. Effective health information should provide objective descriptions and cite reliable sources; in addition, it should provide accurate, customised messages for recipients who have high background knowledge level and ability to discern message quality. © 2017 Health Libraries Group Health Information & Libraries Journal.

  10. 77 FR 64799 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2012-10-23

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy... Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires... Kogut, Executive Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25...

  11. 78 FR 46330 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2013-07-31

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Office of Science... High Energy Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat... CONTACT: John Kogut, Executive Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy...

  12. 76 FR 19986 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2011-04-11

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86... FURTHER INFORMATION CONTACT: John Kogut, Executive Secretary; High Energy Physics Advisory Panel; U.S...

  13. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  14. Analysis of twitter users' sharing of official new york storm response messages.

    Science.gov (United States)

    Genes, Nicholas; Chary, Michael; Chason, Kevin

    2014-01-01

    Twitter is a social network where users read, send, and share snippets of text ("tweets"). Tweets can be disseminated through multiple means; on desktop computers, laptops, and mobile devices, over ethernet, Wi-Fi or cellular networks. This redundancy positions Twitter as a useful tool for disseminating information to the public during emergencies or disasters. Previous research on dissemination of information using Twitter has mostly investigated the characteristics of tweets that are most effective in raising consumer awareness about a new product or event. In particular, they describe characteristics that increase the chance the messages will be shared ("retweeted") by users. In comparison, little has been published on how information from municipal or state government agencies spreads on Twitter during emergency situations. Retweeting these messages is a way to enhance public awareness of potentially important instructions from public officials in a disaster. The aim of this study is to (1) describe the tweets of select New York State and New York City agencies by public officials surrounding two notable recent winter storms that required a large-scale emergency response, and (2) identify the characteristics of the tweets of public officials that were most disseminated (retweeted). For one week surrounding Superstorm Sandy (October 2012) and the winter blizzard Nemo (February 2013), we collected (1) tweets from the official accounts for six New York governmental agencies, and (2) all tweets containing the hashtags #sandy (or #nemo) and #nyc. From these data we calculated how many times a tweet was retweeted, controlling for differences in baseline activity in each account. We observed how many hashtags and links each tweet contained. We also calculated the lexical diversity of each tweet, a measure of the range of vocabulary used. During the Sandy storm, 3242 shared (retweeted) messages from public officials were collected. The lexical diversity of official

  15. Connectivity analysis of one-dimensional ad-hoc networks

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Rasmussen, Jakob Gulddahl; Schwefel, Hans-Peter

    hop-count; (3) the connectivity distance, expressing the geographic distance that a message can be propagated in the network on multi-hop paths; (4) the connectivity hops, which corresponds to the number of hops that are necessary to reach all nodes in the connected network. The paper develops...

  16. Connectivity analysis of one-dimensional ad-hoc networks

    DEFF Research Database (Denmark)

    Bøgsted, Martin; Rasmussen, Jakob Gulddahl; Schwefel, Hans Peter

    2011-01-01

    distance, expressing the geographic distance that a message can be propagated in the network on multi-hop paths; (4) the connectivity hops, which corresponds to the number of hops that are necessary to reach all nodes in the connected network. The paper develops analytic expressions for the distributions...

  17. Advisory and autonomous cooperative driving systems

    NARCIS (Netherlands)

    Broek, T.H.A. van den; Ploeg, J.; Netten, B.D.

    2011-01-01

    In this paper, the traffic efficiency of an advisory cooperative driving system, Advisory Acceleration Control is examined and compared to the efficiency of an autonomous cooperative driving system, Cooperative Adaptive Cruise Control. The algorithms and implementation thereof are explained. The

  18. Vibrant Energy Aware Spray and Wait Routing in Delay Tolerant Network

    Directory of Open Access Journals (Sweden)

    Viren G. Patel

    2013-01-01

    Full Text Available Delay tolerant networks (DTN are wireless networks where disconnections arise often due to the mobility of nodes, failures of energy, the low density of nodes, or when the network extends over long distances. In these situations, traditional routing protocols that have been developed for mobile ad hoc networks prove to be unsuccessful to the scope of transmitting messages between nodes. The Spray and Wait routing may achieve low routing and energy efficiency due to the blindness in the spray phase. To deal with this situation, we propose an opportunistic routing with enclosed message copies, called the Vibrant Energy aware Spray and Wait (VESW, which utilizes the information about vibrancy of node and remaining energy to allocate the number of copies between the corresponding pair nodes in the spray phase.

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  1. An Electronic Mail List for a Network of Family Practice Residency Programs: A Good Idea?

    Directory of Open Access Journals (Sweden)

    Jodi Summers Holtrop

    2001-08-01

    Full Text Available The use of an electronic mailing list as a means of communication among faculty in a network of university-affiliated family practice residency programs was evaluated. Faculty were automatically subscribed to the list by the list owner. Messages were tracked for one year and a written evaluation survey was sent. Ninety two messages were sent, with 52% of the messages being posted information. While most (65% survey respondents reported reading 61% or more of the messages, with only 33% ever actually posted at least one message to the list. Given that faculty were automatically subscribed and that there were only 84 total members, the list may have failed to reach a critical mass of active participants. It is concluded that an email list for network faculty did not function as an online discussion group, although it was extremely beneficial as a way of posting information to affiliated residency faculty.

  2. 78 FR 69839 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2013-11-21

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86... CONTACT: John Kogut, Executive Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy...

  3. 78 FR 12043 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2013-02-21

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Office of Science... High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat... INFORMATION CONTACT: John Kogut, Executive Secretary; High Energy Physics Advisory Panel; U.S. Department of...

  4. 75 FR 57463 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2010-09-21

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86... Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000...

  5. 77 FR 4027 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2012-01-26

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86... Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000...

  6. 77 FR 33449 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2012-06-06

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Office of Science... High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat..., Executive Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown...

  7. 76 FR 41234 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2011-07-13

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). The Federal Advisory Committee Act (Pub. L. 92-463, 86... Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000...

  8. 76 FR 8358 - DOE/NSF High Energy Physics Advisory Panel

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF ENERGY DOE/NSF High Energy Physics Advisory Panel AGENCY: Department of Energy.../NSF High Energy Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86... Secretary; High Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000...

  9. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  10. High-Performance Networking

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The series will start with an historical introduction about what people saw as high performance message communication in their time and how that developed to the now to day known "standard computer network communication". It will be followed by a far more technical part that uses the High Performance Computer Network standards of the 90's, with 1 Gbit/sec systems as introduction for an in depth explanation of the three new 10 Gbit/s network and interconnect technology standards that exist already or emerge. If necessary for a good understanding some sidesteps will be included to explain important protocols as well as some necessary details of concerned Wide Area Network (WAN) standards details including some basics of wavelength multiplexing (DWDM). Some remarks will be made concerning the rapid expanding applications of networked storage.

  11. Exporting embedded in culture and transnational networks around entrepreneurs

    DEFF Research Database (Denmark)

    Ashourizadeh, Shayegheh; Schøtt, Thomas

    2016-01-01

    from networking in the market, professions and work-place, but is impeded by networking for advice in the private sphere. Exporting is embedded in culture in the way that benefits of transnational networking for exporting are higher in secular-rational culture than in traditional culture. This study....... This dynamic unfolds in the context of culture, which expectedly moderates benefit of networks for exporting. Networking for advice was surveyed in the Global Entrepreneurship Monitor in 61 societies with 52,968 entrepreneurs. Exporting greatly benefits from transnational networks around entrepreneurs and also...... generalises to the entrepreneurs in the world, and is a first to account for embedding of exporting in transnational advisory networks in combination with culture....

  12. 78 FR 70623 - Pipeline Safety: Meeting of the Gas Pipeline Advisory Committee and the Liquid Pipeline Advisory...

    Science.gov (United States)

    2013-11-26

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2009-0203] Pipeline Safety: Meeting of the Gas Pipeline Advisory Committee and the Liquid Pipeline Advisory Committee AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. [[Page...

  13. Scalable Optical-Fiber Communication Networks

    Science.gov (United States)

    Chow, Edward T.; Peterson, John C.

    1993-01-01

    Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.

  14. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  15. Seeding on Moving Ground: How Understanding Network Instability Can Improve Message Dissemination

    Directory of Open Access Journals (Sweden)

    Muchnik Lev

    2017-11-01

    Full Text Available Most analyses of the social structure of a network implicitly assume that the relationships in the network are relatively stable. We present evidence that this is not the case. The focal network of this study grew in bursts rather than monotonously over time, and the bursts were highly localized. Links were added and deleted in nearby localities and are not randomly dispersed throughout the network. Also changes in structure lead to simultaneous changes in self-stated interests of its members. For SNA marketing applications the findings suggest interesting improvements. Local bursts around a seed can change the structure of the network dramatically and therefore a marketer’s influence and his chances of success. Therefore, network measurements should be carried out more frequently and closer to the actual implementation of a seeding campaign. To detect these abrupt, dramatic local changes marketers also use a finer resolution. Further, recommendation algorithms that simultaneously account for changes in network structure and content should be applied.

  16. Gain versus loss-framed messaging and colorectal cancer screening among African Americans: A preliminary examination of perceived racism and culturally targeted dual messaging.

    Science.gov (United States)

    Lucas, Todd; Hayman, Lenwood W; Blessman, James E; Asabigi, Kanzoni; Novak, Julie M

    2016-05-01

    This preliminary study examined the effect of gain versus loss-framed messaging as well as culturally targeted personal prevention messaging on African Americans' receptivity to colorectal cancer (CRC) screening. This research also examined mechanistic functions of perceived racism in response to message framing. Community samples of African Americans (N = 132) and White Americans (N = 50) who were non-compliant with recommended CRC screening completed an online education module about CRC, and were either exposed to a gain-framed or loss-framed message about CRC screening. Half of African Americans were exposed to an additional and culturally targeted self-control message about personal prevention of CRC. Theory of planned behavior measures of attitudes, normative beliefs, perceived behavioural control, and intentions to obtain a CRC screen served as primary outcomes. The effect of messaging on perceived racism was also measured as an outcome. Consistent with prior research, White Americans were more receptive to CRC screening when exposed to a loss-framed message. However, African Americans were more receptive when exposed to a gain-framed message. The contrary effect of loss-framed messaging on receptivity to screening among African Americans was mediated by an increase in perceived racism. However, including an additional and culturally targeted prevention message mitigated the adverse effect of a loss-framed message. This study identifies an important potential cultural difference in the effect of message framing on illness screening among African Americans, while also suggesting a culturally relevant linking mechanism. This study also suggests the potential for simultaneously presented and culturally targeted messaging to alter the effects of gain and loss-framed messaging on African Americans. What is already known on this subject? African Americans are at an increased risk of both developing and dying from colorectal cancer (CRC). These disparities can be

  17. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  18. 75 FR 6651 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2010-02-10

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  19. Quantitative risk assessment of foods containing peanut advisory labeling.

    Science.gov (United States)

    Remington, Benjamin C; Baumert, Joseph L; Marx, David B; Taylor, Steve L

    2013-12-01

    Foods with advisory labeling (i.e. "may contain") continue to be prevalent and the warning may be increasingly ignored by allergic consumers. We sought to determine the residual levels of peanut in various packaged foods bearing advisory labeling, compare similar data from 2005 and 2009, and determine any potential risk for peanut-allergic consumers. Of food products bearing advisory statements regarding peanut or products that had peanut listed as a minor ingredient, 8.6% and 37.5% contained detectable levels of peanut (>2.5 ppm whole peanut), respectively. Peanut-allergic individuals should be advised to avoid such products regardless of the wording of the advisory statement. Peanut was detected at similar rates and levels in products tested in both 2005 and 2009. Advisory labeled nutrition bars contained the highest levels of peanut and an additional market survey of 399 products was conducted. Probabilistic risk assessment showed the risk of a reaction to peanut-allergic consumers from advisory labeled nutrition bars was significant but brand-dependent. Peanut advisory labeling may be overused on some nutrition bars but prudently used on others. The probabilistic approach could provide the food industry with a quantitative method to assist with determining when advisory labeling is most appropriate. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  1. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  2. 78 FR 57174 - Advisory Committee Meeting

    Science.gov (United States)

    2013-09-17

    ... recommended for inclusion on future Joint Board examinations in actuarial mathematics, pension law and... Advisory Committee on Actuarial Examinations. DATES: The meeting will be held on October 18, 2013, from 8.... SUPPLEMENTARY INFORMATION: Notice is hereby given that the Advisory Committee on Actuarial Examinations will...

  3. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  4. 78 FR 68887 - Dodd-Frank Investor Advisory Committee; Meeting

    Science.gov (United States)

    2013-11-15

    ... Investor Advisory Committee; Meeting AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the...

  5. 78 FR 6087 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Office of... the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory Committee... Federal Officer, BERAC, U.S. Department of Energy, Office of Science, Office of Biological and...

  6. 77 FR 4028 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2012-01-26

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  7. Temporal stability in human interaction networks

    Science.gov (United States)

    Fabbri, Renato; Fabbri, Ricardo; Antunes, Deborah Christina; Pisani, Marilia Mello; de Oliveira, Osvaldo Novais

    2017-11-01

    This paper reports on stable (or invariant) properties of human interaction networks, with benchmarks derived from public email lists. Activity, recognized through messages sent, along time and topology were observed in snapshots in a timeline, and at different scales. Our analysis shows that activity is practically the same for all networks across timescales ranging from seconds to months. The principal components of the participants in the topological metrics space remain practically unchanged as different sets of messages are considered. The activity of participants follows the expected scale-free trace, thus yielding the hub, intermediary and peripheral classes of vertices by comparison against the Erdös-Rényi model. The relative sizes of these three sectors are essentially the same for all email lists and the same along time. Typically, 45% are peripheral vertices. Similar results for the distribution of participants in the three sectors and for the relative importance of the topological metrics were obtained for 12 additional networks from Facebook, Twitter and ParticipaBR. These properties are consistent with the literature and may be general for human interaction networks, which has important implications for establishing a typology of participants based on quantitative criteria.

  8. 76 FR 1130 - Prince William Sound Resource Advisory Committee

    Science.gov (United States)

    2011-01-07

    ... DEPARTMENT OF AGRICULTURE Forest Service Prince William Sound Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Prince William Sound Resource Advisory... conducted: The Prince William Sound Resource Advisory Committee (RAC) will be discussing and voting on...

  9. 77 FR 45331 - Prince William Sound Resource Advisory Committee

    Science.gov (United States)

    2012-07-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Prince William Sound Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Prince William Sound Resource Advisory... Prince William Sound Resource Advisory Committee (RAC) will be discussing and voting on proposals that...

  10. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  11. Outpatient blood pressure monitoring using bi-directional text messaging.

    Science.gov (United States)

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  12. Tracing How Normative Messages May Influence Physical Activity Intention.

    Science.gov (United States)

    van Bavel, René; Esposito, Gabriele; Baranowski, Tom; Duch-Brown, Néstor

    2017-04-01

    Normative messages have been shown to increase intention to do physical activity. We traced how "positive" and "negative" normative messages influenced physical activity intention by comparing constructs of the model of goal-directed behavior with descriptive norms (MGDB + DNs) across control and treatment groups in an experiment. For this purpose, 16-24-year-old respondents (n = 1,200) in Bulgaria, Croatia, and Romania were asked about their age, sex, and levels of physical activity before being exposed to positive and negative normative messages and completing a questionnaire with MGDB + DNs scales. Different MGDB + DNs constructs were influenced by the normative messages: compared with the control, the negative message group showed stronger attitudes (p = .003) and the positive message group showed higher positive anticipated emotions (p = .005). The positive message's effect is consistent with the literature on conformity to social norms. The negative message's effect lends itself to interpretations based on social identity and deviance regulation theories.

  13. Effects of Instant Messaging on School Performance in Adolescents.

    Science.gov (United States)

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  14. The WLCG Messaging Service and its Future

    CERN Document Server

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  15. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  16. The advisory list for selvclassification of dangerous substances

    DEFF Research Database (Denmark)

    Niemelä, Jay Russell; Wedebye, Eva Bay; Nikolov, Nikolai Georgiev

    All chemical substances marketed in the EU must be classified and labelled according to the regulation on classification and labelling of dangerous substances (7). Substances with harmonised classifications adopted in the EU are to be found on the List of harmonised classification and labelling...... this issue, the Danish Environmental Protection Agency published the Advisory Self-classification List /5/. This report describes the updating of this list. The Advisory Self-Classification list is created by the use of (Q)SARs ((Quantitative) Structure-Activity Relationships) to predict the effects...... Skin sensitisation The updated advisory list is available as an Excel file for download from DK-EPA's website and as an online searchable database. This includes the 23,922 chemicals with new advisory classifications resulting from this project, making in all, a total of 30,179 chemicals with advisory...

  17. 78 FR 28594 - Advisory Committee Meeting

    Science.gov (United States)

    2013-05-15

    ... draft competitiveness report, and Ex-Im Bank economic impact policy update. Public Participation: The... EXPORT-IMPORT BANK OF THE UNITED STATES Advisory Committee Meeting ACTION: Notice of Open Meeting of the Advisory Committee of the Export- Import Bank of the United States (Ex-Im Bank). Time and...

  18. Extension of Pairwise Broadcast Clock Synchronization for Multicluster Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bruce W. Suter

    2008-01-01

    Full Text Available Time synchronization is crucial for wireless sensor networks (WSNs in performing a number of fundamental operations such as data coordination, power management, security, and localization. The Pairwise Broadcast Synchronization (PBS protocol was recently proposed to minimize the number of timing messages required for global network synchronization, which enables the design of highly energy-efficient WSNs. However, PBS requires all nodes in the network to lie within the communication ranges of two leader nodes, a condition which might not be available in some applications. This paper proposes an extension of PBS to the more general class of sensor networks. Based on the hierarchical structure of the network, an energy-efficient pair selection algorithm is proposed to select the best pairwise synchronization sequence to reduce the overall energy consumption. It is shown that in a multicluster networking environment, PBS requires a far less number of timing messages than other well-known synchronization protocols and incurs no loss in synchronization accuracy. Moreover, the proposed scheme presents significant energy savings for densely deployed WSNs.

  19. Pilot study of psychotherapeutic text messaging for depression.

    Science.gov (United States)

    Pfeiffer, Paul N; Henry, Jennifer; Ganoczy, Dara; Piette, John D

    2017-08-01

    Background Text messaging services could increase access to psychotherapeutic content for individuals with depression by avoiding barriers to in-person psychotherapy such as cost, transportation, and therapist availability. Determining whether text messages reflecting different psychotherapeutic techniques exhibit differences in acceptability or effectiveness may help guide service development. Objectives We aimed to determine: (1) the feasibility of delivering a psychotherapy-based text messaging service to people with depression identified via the internet, (2) whether there is variation in satisfaction with messages according to the type of psychotherapeutic technique they represent, and (3) whether symptoms of depression vary according to receipt of each message type and participants' satisfaction with the messages they received. Methods For this study 190 US adults who screened positive for a major depressive episode (Patient Health Questionnaire (PHQ-9) score ≥10) were recruited from online advertisements. Participants received a daily psychotherapy-based text message 6 days per week for 12 weeks. Text messages were developed by a team of psychiatrists, psychologists, and social workers to reflect three psychotherapeutic approaches: acceptance and commitment therapy (ACT), behavioural activation, and cognitive restructuring. Each week the message type for the week was randomly assigned from one of the three types, allowing for repeats. Participants were asked daily to rate each message. On the 7th day of each week, participants completed a two-item depression screener (PHQ-2). Web-based surveys at baseline, 6, and 12 weeks were used as the primary measure of depressive symptoms (PHQ-9). Results Of the 190 participants enrolled, 85 (45%) completed the 6-week web survey and 67 (35%) completed the 12-week survey. The mean baseline PHQ-9 score was 19.4 (SD 4.2) and there was a statistically significant mean improvement in PHQ-9 scores of -2.9 (SD 6.0; p

  20. Systematic and heuristic processing of majority and minority-endorsed messages: the effects of varying outcome relevance and levels of orientation on attitude and message processing.

    Science.gov (United States)

    Martin, Robin; Hewstone, Miles; Martin, Pearl Y

    2007-01-01

    Two experiments investigated the conditions under which majority and minority sources instigate systematic processing of their messages. Both experiments crossed source status (majority vs. minority) with message quality (strong vs. weak arguments). In each experiment, message elaboration was manipulated by varying either motivational (outcome relevance, Experiment 1) or cognitive (orientating tasks, Experiment 2) factors. The results showed that when either motivational or cognitive factors encouraged low message elaboration, there was heuristic acceptance of the majority position without detailed message processing. When the level of message elaboration was intermediate, there was message processing only for the minority source. Finally, when message elaboration was high, there was message processing for both source conditions. These results show that majority and minority influence is sensitive to motivational and cognitive factors that constrain or enhance message elaboration and that both sources can lead to systematic processing under specific circumstances.

  1. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will hold its annual meeting on May 6, 2010. The meeting will be open... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee...

  2. A collaborative processes synchronization method with regard to system crashes and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2014-01-01

    Processes can synchronize their states by exchanging messages. System crashes and network failures may cause message loss, so that state changes of a process may remain unnoticed by its partner processes, resulting in state inconsistency or deadlocks. In this paper we define a method to transform a

  3. Understanding health food messages on Twitter for health literacy promotion.

    Science.gov (United States)

    Zhou, J; Liu, F; Zhou, H

    2018-05-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  4. Examining ISIS Support and Opposition Networks on Twitter

    Science.gov (United States)

    2016-01-01

    Examining ISIS Support and Opposition Networks on Twitter Elizabeth Bodine-Baron, Todd C. Helmus, Madeline Magnuson, Zev Winkelman C O R P O R A T...Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers...and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to cas- tigate the ISIS message. This report draws on

  5. 76 FR 7869 - Notice of Meeting; Advisory Council on Historic Preservation

    Science.gov (United States)

    2011-02-11

    ... ADVISORY COUNCIL ON HISTORIC PRESERVATION Notice of Meeting; Advisory Council on Historic Preservation AGENCY: Advisory Council on Historic Preservation. ACTION: Notice of Meeting. Summary: Notice is hereby given that the Advisory Council on Historic Preservation (ACHP) will meet Thursday, February 17...

  6. 75 FR 71135 - Notice of Meeting; Advisory Council on Historic Preservation

    Science.gov (United States)

    2010-11-22

    ... ADVISORY COUNCIL ON HISTORIC PRESERVATION Notice of Meeting; Advisory Council on Historic Preservation AGENCY: Advisory Council on Historic Preservation. ACTION: Notice of meeting. SUMMARY: Notice is hereby given that the Advisory Council on Historic Preservation (ACHP) will meet Thursday, December 2...

  7. 78 FR 44954 - Advisory Board on Radiation and Worker Health (ABRWH or Advisory Board), National Institute for...

    Science.gov (United States)

    2013-07-25

    ... provided to the contact person below in advance of the meeting. Background: The Advisory Board was... President on a variety of policy and technical functions required to implement and effectively manage the new compensation program. Key functions of the Advisory Board include providing advice on the...

  8. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  9. 75 FR 65447 - Prince of Wales Resource Advisory Committee

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF AGRICULTURE Forest Service Prince of Wales Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Prince of Wales Resource Advisory Committee... Ranger District 504 9th Street, Craig, Alaska. Send written comments to Prince of Wales Resource Advisory...

  10. 78 FR 73187 - Black Hills National Forest Advisory Board

    Science.gov (United States)

    2013-12-05

    ... DEPARTMENT OF AGRICULTURE Forest Service Black Hills National Forest Advisory Board AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Black Hills National Forest Advisory Board (Board... all members of the Advisory Board; (2) provide orientation to Board Members on Basic Laws governing...

  11. 77 FR 64524 - Arthritis Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-10-22

    ...), submitted by Hemispherx Biopharma, Inc., for the treatment of patients with chronic fatigue syndrome. FDA... scroll down to the appropriate advisory committee meeting link, or call the advisory committee... available at http://www.fda.gov/AdvisoryCommittees/Calendar/default.htm . Scroll down to the appropriate...

  12. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  13. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  14. Development of a text messaging system to improve receipt of survivorship care in adolescent and young adult survivors of childhood cancer.

    Science.gov (United States)

    Casillas, Jacqueline; Goyal, Anju; Bryman, Jason; Alquaddoomi, Faisal; Ganz, Patricia A; Lidington, Emma; Macadangdang, Joshua; Estrin, Deborah

    2017-08-01

    This study aimed to develop and examine the acceptability, feasibility, and usability of a text messaging, or Short Message Service (SMS), system for improving the receipt of survivorship care for adolescent and young adult (AYA) survivors of childhood cancer. Researchers developed and refined the text messaging system based on qualitative data from AYA survivors in an iterative three-stage process. In stage 1, a focus group (n = 4) addressed acceptability; in stage 2, key informant interviews (n = 10) following a 6-week trial addressed feasibility; and in stage 3, key informant interviews (n = 23) following a 6-week trial addressed usability. Qualitative data were analyzed using a constant comparative analytic approach exploring in-depth themes. The final system includes programmed reminders to schedule and attend late effect screening appointments, tailored suggestions for community resources for cancer survivors, and messages prompting participant feedback regarding the appointments and resources. Participants found the text messaging system an acceptable form of communication, the screening reminders and feedback prompts feasible for improving the receipt of survivorship care, and the tailored suggestions for community resources usable for connecting survivors to relevant services. Participants suggested supplementing survivorship care visits and forming AYA survivor social networks as future implementations for the text messaging system. The text messaging system may assist AYA survivors by coordinating late effect screening appointments, facilitating a partnership with the survivorship care team, and connecting survivors with relevant community resources. The text messaging system has the potential to improve the receipt of survivorship care.

  15. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    DEFF Research Database (Denmark)

    Burgy, Laurent; Reveillere, Laurent; Lawall, Julia Laetitia

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain...

  16. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  17. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  18. Nuclear protective action advisories: A policy analysis and evaluation

    International Nuclear Information System (INIS)

    Johnson, J.H. Jr.; Zeigler, D.J.

    1989-01-01

    Widespread spontaneous evacuation, the tendency for people to evacuate even when not advised to do so, has been highlighted as one of the likely behavior responses to a nuclear power plant emergency. Utility company representatives contend that protective action advisories can be structured so as to stifle the magnitude and geographic extent of spontaneous evacuation. Data from a utility-company-sponsored telephone survey of households on Long Island, New York, where the Shoreham Nuclear Power Station is located, are used in this paper to test this proposition. Analyses of responses given to three sets of increasingly serious reactor accident scenarios, with and without information instructing people what protective actions to take, raise serious questions about the ability of emergency notification messages to affect human behavior in a radiological emergency. The results suggest firstly, that even if people are specifically advised not to evacuate, most would be inclined to do so; and secondly, that attempts to stifle the propensity to evacuate among those who are not at risk are likely to increase the propensity to stay behind among those who are at risk and should evacuate

  19. The Impact of Formal Hierarchies on Enterprise Social Networking Behavior

    DEFF Research Database (Denmark)

    Behrendt, Sebastian; Klier, Julia; Klier, Mathias

    2015-01-01

    With more and more companies using enterprise social networks (ESN) for employee communication and collaboration, the influence of ESN on organizational hierarchies has been subject of countless discussions in practice-oriented media and first academic studies. Conversely, the question whether...... and how formal organizational hierarchies influence ESN usage behavior has not yet been addressed. Drawing on a rich data set comprising 2.5 years of relationship building via direct messages, confirmed contact requests, and group messages, we are able to show that formal hierarchies have an important...... impact on social networking behavior. By applying means of social network analysis and supported by statements from interviews, we illustrate how deeply formal hierarchy impacts the three examined types of relationships. Our results motivate academics to further study the interrelation between hierarchy...

  20. 16 CFR 1018.12 - Statutory advisory committees.

    Science.gov (United States)

    2010-01-01

    ... Federal Hazardous Substances Act, as amended (Pub. L. 95-631, 92 Stat. 3747, 15 U.S.C. 1275). [46 FR 63248... MANAGEMENT Establishment of Advisory Committees § 1018.12 Statutory advisory committees. The Commission has...